Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3334 | Denial of Service attack on windows app using netty |
Github GHSA |
GHSA-xq3w-v528-46rv | Denial of Service attack on windows app using netty |
Fri, 05 Sep 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows |
|
| CPEs | cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows |
Tue, 01 Jul 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:amq_streams:2.9::el9 |
Wed, 02 Apr 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:jboss_enterprise_application_platform:7.4 cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7 cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8 cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9 |
Fri, 28 Mar 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat jboss Enterprise Application Platform
|
|
| CPEs | cpe:/a:redhat:jboss_enterprise_application_platform:8.0 cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8 cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9 |
|
| Vendors & Products |
Redhat jboss Enterprise Application Platform
|
Thu, 06 Mar 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat amq Streams
|
|
| CPEs | cpe:/a:redhat:amq_streams:2 | |
| Vendors & Products |
Redhat amq Streams
|
Thu, 13 Feb 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat quarkus |
|
| CPEs | cpe:/a:redhat:quarkus:3.15::el8 | |
| Vendors & Products |
Redhat
Redhat quarkus |
Wed, 13 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netty
Netty netty |
|
| CPEs | cpe:2.3:a:netty:netty:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Netty
Netty netty |
|
| Metrics |
ssvc
|
Wed, 13 Nov 2024 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 12 Nov 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115. | |
| Title | Denial of Service attack on windows app using Netty | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-13T20:44:41.743Z
Reserved: 2024-09-25T21:46:10.929Z
Link: CVE-2024-47535
Updated: 2024-11-13T20:44:36.110Z
Status : Analyzed
Published: 2024-11-12T16:15:22.237
Modified: 2025-09-05T14:00:07.220
Link: CVE-2024-47535
OpenCVE Enrichment
No data.
EUVD
Github GHSA