Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade io.netty:netty-common
to version 4.1.118, 4.2.0.RC3 or higher.
Affected versions of this package are vulnerable to Improper Validation of Specified Quantity in Input in BufferedReader.readLine()
, which does not count null bytes when calculating the acceptable size of an input stream. An attacker can cause the application to crash by creating a large file in C:\etc\os-release
or C:\usr\lib\os-release
which the application attempts to load. If the file exceeds the JVM's memory limit (1 GB by default) the application will crash when loading it into memory.
Note: This vulnerability affects only Windows environments and is a bypass for the previously reported and fixed CVE-2024-47535.