{ "id": "CVE-2024-41172", "sourceIdentifier": "security@apache.org", "published": "2024-07-19T09:15:05.640", "lastModified": "2024-11-21T09:32:20.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In versions of Apache CXF before 3.6.4 and 4.0.5 (3.5.x and lower versions are not impacted), a CXF HTTP client conduit may prevent HTTPClient instances from being garbage collected and it is possible that memory consumption will continue to increase, eventually causing the application to run out of memory\n" }, { "lang": "es", "value": "En las versiones de Apache CXF anteriores a 3.6.4 y 4.0.5 (las versiones 3.5.x y inferiores no se ven afectadas), un conducto de cliente HTTP de CXF puede impedir que las instancias de HTTPClient se recopilen como basura y es posible que el consumo de memoria contin\u00fae aumentando eventualmente causando que la aplicaci\u00f3n se quede sin memoria." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "baseScore": 5.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "LOW" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "security@apache.org", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-401" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.6.0", "versionEndExcluding": "3.6.4", "matchCriteriaId": "7D6F6603-DD23-4DD5-8B90-0BAB0EB7E1D1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", "versionEndExcluding": "4.0.5", "matchCriteriaId": "ACAFECF5-75A5-4397-A588-F51D09717335" } ] } ] } ], "references": [ { "url": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6", "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/18/4", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ] }, { "url": "https://security.netapp.com/advisory/ntap-20240808-0008/", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }