CVE-2021-3629

A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Final.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1977362 Issue Tracking Third Party Advisory
https://security.netapp.com/advisory/ntap-20220729-0008/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:integration:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:wildfly_core:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*

History

07 Feb 2023, 19:19

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 7.5
v2 : 4.3
v3 : 5.9

10 Nov 2022, 16:43

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20220729-0008/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20220729-0008/ - Third Party Advisory
CPE cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
First Time Netapp oncommand Insight
Netapp active Iq Unified Manager
Netapp oncommand Workflow Automation
Netapp

29 Jul 2022, 20:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20220729-0008/ -

09 Jun 2022, 15:39

Type Values Removed Values Added
CWE CWE-400
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1977362 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1977362 - Issue Tracking, Third Party Advisory
First Time Redhat single Sign-on
Redhat undertow
Redhat integration
Redhat wildfly Core
Redhat
Redhat jboss Enterprise Application Platform
Redhat enterprise Linux
CPE cpe:2.3:a:redhat:integration:-:*:*:*:text-only:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:wildfly_core:*:*:*:*:*:*:*:*

24 May 2022, 19:18

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-24 19:15

Updated : 2023-12-10 14:22


NVD link : CVE-2021-3629

Mitre link : CVE-2021-3629

CVE.ORG link : CVE-2021-3629


JSON object : View

Products Affected

netapp

  • oncommand_workflow_automation
  • oncommand_insight
  • active_iq_unified_manager

redhat

  • undertow
  • jboss_enterprise_application_platform
  • wildfly_core
  • integration
  • enterprise_linux
  • single_sign-on
CWE
CWE-400

Uncontrolled Resource Consumption