Improper Validation of Specified Quantity in Input Affecting io.netty:netty-handler package, versions [4.1.91.Final,4.1.118.Final)[4.2.0.Alpha1,4.2.0.RC3)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-IONETTY-8707739
  • published11 Feb 2025
  • disclosed10 Feb 2025
  • creditJohno Crawford

Introduced: 10 Feb 2025

NewCVE-2025-24970  (opens in a new tab)
CWE-1284  (opens in a new tab)

How to fix?

Upgrade io.netty:netty-handler to version 4.1.118.Final, 4.2.0.RC3 or higher.

Overview

io.netty:netty-handler is a library that provides an asynchronous event-driven network application framework and tools for rapid development of maintainable high performance and high scalability protocol servers and clients. In other words, Netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients. It greatly simplifies and streamlines network programming such as TCP and UDP socket server.

Affected versions of this package are vulnerable to Improper Validation of Specified Quantity in Input when validating SSL packets using the native SSLEngine. The SSL_RECORD_HEADER_LENGTH of an incoming packet is not properly checked in the getEncryptedPacketLength() function, allowing attackers to trigger a crash by sending malicious packets.

Workaround

This vulnerability can be avoided by not using the native SSLEngine.

CVSS Scores

version 4.0
version 3.1