{"id":"CVE-2020-35510","details":"A flaw was found in jboss-remoting in versions before 5.0.20.SP1-redhat-00001. A malicious attacker could cause threads to hold up forever in the EJB server by writing a sequence of bytes corresponding to the expected messages of a successful EJB client request, but omitting the ACK messages, or just tamper with jboss-remoting code, deleting the lines that send the ACK message from the EJB client code resulting in a denial of service. The highest threat from this vulnerability is to system availability.","aliases":["GHSA-p6j8-hgv5-m35g"],"modified":"2026-04-10T04:27:00.359979Z","published":"2021-06-02T14:15:09.393Z","references":[{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905796"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jboss-remoting/jboss-remoting","events":[{"introduced":"0"},{"fixed":"7ddcda3c0180b17059b9991305e9c8f410710fb0"},{"introduced":"0"},{"last_affected":"7ddcda3c0180b17059b9991305e9c8f410710fb0"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.0.20"},{"introduced":"0"},{"last_affected":"5.0.20-NA"}]}}],"versions":["3.1.0.Beta2","3.2.0.Beta1","3.2.0.Beta2","3.2.0.Beta3","3.2.0.Beta4","3.2.0.Beta5","3.2.0.Beta6","3.2.0.CR1","3.2.0.CR2","3.2.0.CR3","3.2.0.CR4","3.2.0.CR5","3.2.0.CR6","3.2.0.CR7","3.2.0.CR8","3.2.0.CR9","3.2.0.GA","4.0.0.Beta1","4.0.0.Beta2","4.0.0.Beta3","4.0.0.Final","5.0.0.Beta1","5.0.0.Beta10","5.0.0.Beta11","5.0.0.Beta12","5.0.0.Beta13","5.0.0.Beta14","5.0.0.Beta15","5.0.0.Beta16","5.0.0.Beta17","5.0.0.Beta18","5.0.0.Beta19","5.0.0.Beta2","5.0.0.Beta20","5.0.0.Beta21","5.0.0.Beta22","5.0.0.Beta23","5.0.0.Beta24","5.0.0.Beta25","5.0.0.Beta3","5.0.0.Beta4","5.0.0.Beta5","5.0.0.Beta6","5.0.0.Beta7","5.0.0.Beta8","5.0.0.Beta9","5.0.0.CR1","5.0.0.CR2","5.0.0.CR3","5.0.0.CR4","5.0.0.CR5","5.0.0.Final","5.0.1.Final","5.0.2.Final","5.0.20.Final"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-35510.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}