A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.
History

Sat, 06 Dec 2025 00:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:8.0
References

Thu, 04 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
References

Thu, 04 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
References

Thu, 04 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:8 cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
References

Thu, 04 Dec 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 03 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 03 Dec 2025 19:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.
Title Undertow: outofmemory when parsing form data encoding with application/x-www-form-urlencoded
First Time appeared Redhat
Redhat amq Streams
Redhat apache Camel Hawtio
Redhat build Keycloak
Redhat camel Quarkus
Redhat camel Spring Boot
Redhat integration
Redhat jboss Data Grid
Redhat jboss Enterprise Application Platform
Redhat jboss Enterprise Bpms Platform
Redhat jboss Fuse
Redhat jboss Fuse Service Works
Redhat jbosseapxp
Redhat optaplanner
Redhat quarkus
Redhat red Hat Single Sign On
Redhat serverless
Redhat service Registry
Weaknesses CWE-20
CPEs cpe:/a:redhat:amq_streams:1
cpe:/a:redhat:apache_camel_hawtio:4
cpe:/a:redhat:build_keycloak:
cpe:/a:redhat:camel_quarkus:2
cpe:/a:redhat:camel_quarkus:3
cpe:/a:redhat:camel_spring_boot:3
cpe:/a:redhat:camel_spring_boot:4
cpe:/a:redhat:integration:1
cpe:/a:redhat:jboss_data_grid:7
cpe:/a:redhat:jboss_data_grid:8
cpe:/a:redhat:jboss_enterprise_application_platform:7
cpe:/a:redhat:jboss_enterprise_application_platform:8
cpe:/a:redhat:jboss_enterprise_bpms_platform:7
cpe:/a:redhat:jboss_fuse:7
cpe:/a:redhat:jboss_fuse_service_works:6
cpe:/a:redhat:jbosseapxp
cpe:/a:redhat:optaplanner:::el6
cpe:/a:redhat:quarkus:3
cpe:/a:redhat:red_hat_single_sign_on:7
cpe:/a:redhat:serverless:1
cpe:/a:redhat:service_registry:2
Vendors & Products Redhat
Redhat amq Streams
Redhat apache Camel Hawtio
Redhat build Keycloak
Redhat camel Quarkus
Redhat camel Spring Boot
Redhat integration
Redhat jboss Data Grid
Redhat jboss Enterprise Application Platform
Redhat jboss Enterprise Bpms Platform
Redhat jboss Fuse
Redhat jboss Fuse Service Works
Redhat jbosseapxp
Redhat optaplanner
Redhat quarkus
Redhat red Hat Single Sign On
Redhat serverless
Redhat service Registry
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2025-12-03T18:40:25.606Z

Updated: 2025-12-06T00:07:44.045Z

Reserved: 2024-04-16T13:30:53.755Z

Link: CVE-2024-3884

cve-icon Vulnrichment

Updated: 2025-12-03T20:50:19.755Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-03T19:15:54.767

Modified: 2025-12-06T01:15:47.433

Link: CVE-2024-3884

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-12-03T16:50:50Z

Links: CVE-2024-3884 - Bugzilla