CVE-2023-36478

Summary

CVECVE-2023-36478
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-10-10 17:15:00 UTC
Updated2023-11-16 16:15:00 UTC
DescriptionEclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to exceed their size limit. `MetaDataBuilder.java` determines if a header name or value exceeds the size limit, and throws an exception if the limit is exceeded. However, when length is very large and huffman is true, the multiplication by 4 in line 295 will overflow, and length will become negative. `(_size+length)` will now be negative, and the check on line 296 will not be triggered. Furthermore, `MetaDataBuilder.checkSize` allows for user-entered HPACK header value sizes to be negative, potentially leading to a very large buffer allocation later on when the user-entered size is multiplied by 2. This means that if a user provides a negative length value (or, more precisely, a length value which, when multiplied by the 4/3 fudge factor, is negative), and this length value is a very large positive number when multiplied by 2, then the user can cause a very large buffer to be allocated on the server. Users of HTTP/2 can be impacted by a remote denial of service attack. The issue has been fixed in versions 11.0.16, 10.0.16, and 9.4.53. There are no known workarounds.

Risk And Classification

Problem Types: CWE-190

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Eclipse Jetty All All All All
Application Jenkins Jenkins All All All All
Application Jenkins Jenkins All All All All

References

ReferenceSourceLinkTags
Issue #9554 - move common hpack/qpack code to jetty-http (jetty-10) by lachlan-roberts · Pull Request #9634 · eclipse/jetty.project · GitHub MISC github.com
Release 11.0.16 · eclipse/jetty.project · GitHub MISC github.com
HTTP/2 HPACK integer overflow and buffer allocation · Advisory · eclipse/jetty.project · GitHub MISC github.com
security.netapp.com/advisory/ntap-20231116-0011 security.netapp.com
oss-security - Vulnerability in Jenkins MISC www.openwall.com
Debian -- Security Information -- DSA-5540-1 jetty9 MISC www.debian.org
[SECURITY] [DLA 3641-1] jetty9 security update MISC lists.debian.org
Release 9.4.53.v20231009 · eclipse/jetty.project · GitHub MISC github.com
Release 10.0.16 · eclipse/jetty.project · GitHub MISC github.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 379452 IBM Cognos Analytics Multiple Vulnerabilities (7123154)
  • 379516 IBM Sterling Secure Proxy Multiple Vulnerabilities (7142038)
  • 503390 Alpine Linux Security Update for jetty-runner
  • 506101 Alpine Linux Security Update for jetty-runner
  • 6000267 Debian Security Update for jetty9 (DLA 3641-1)
  • 6000299 Debian Security Update for jetty9 (DSA 5540-1)
  • 691330 Free Berkeley Software Distribution (FreeBSD) Security Update for jenkins (1ee26d45-6ddb-11ee-9898-00e081b7aa2d)
  • 730958 Jenkins HTTP/2 Denial of Service (DoS) Vulnerability (Jenkins Security Advisory 2023-10-18)
  • 731282 Atlassian Confluence Data Center and Server Multiple Security Vulnerabilities (CONFSERVER-94604, CONFSERVER-94843)
  • 731321 Atlassian Confluence Data Center and Server Denial of Service (DoS) Vulnerability (CONFSERVER-94843)
  • 755165 SUSE Enterprise Linux Security Update for jetty-minimal (SUSE-SU-2023:4210-1)
  • 995551 Java (Maven) Security Update for org.eclipse.jetty.http2:http2-hpack (GHSA-wgh7-54f2-x98r)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report