{"id":"CVE-2021-3690","details":"A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability.","aliases":["GHSA-fj7c-vg2v-ccrm"],"modified":"2026-04-02T07:05:07.838060Z","published":"2022-08-23T16:15:09.450Z","references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2021-3690"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1991299"},{"type":"REPORT","url":"https://issues.redhat.com/browse/UNDERTOW-1935"},{"type":"FIX","url":"https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/undertow-io/undertow","events":[{"introduced":"0"},{"last_affected":"30392f538d254ed54834854e3f7face2bf945dcb"},{"introduced":"0"},{"fixed":"225d62735b189e460a56460207b8c6073fcc3737"},{"introduced":"2291c7c07dc5bccf3b45c4db3a1b63123b8ce484"},{"fixed":"40926588d550bf28f583617d93a0a1520110a2d0"},{"fixed":"c7e84a0b7efced38506d7d1dfea5902366973877"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.0"},{"introduced":"0"},{"fixed":"2.0.40"},{"introduced":"2.1.0"},{"fixed":"2.2.10"}]}}],"versions":["1.0.0.Alpha1","1.0.0.Alpha10","1.0.0.Alpha11","1.0.0.Alpha12","1.0.0.Alpha13","1.0.0.Alpha14","1.0.0.Alpha15","1.0.0.Alpha16","1.0.0.Alpha17","1.0.0.Alpha18","1.0.0.Alpha19","1.0.0.Alpha2","1.0.0.Alpha20","1.0.0.Alpha21","1.0.0.Alpha22","1.0.0.Alpha3","1.0.0.Alpha4","1.0.0.Alpha5","1.0.0.Alpha6","1.0.0.Alpha7","1.0.0.Alpha8","1.0.0.Alpha9","1.0.0.Beta1","1.0.0.Beta10","1.0.0.Beta11","1.0.0.Beta12","1.0.0.Beta13","1.0.0.Beta14","1.0.0.Beta15","1.0.0.Beta16","1.0.0.Beta17","1.0.0.Beta18","1.0.0.Beta19","1.0.0.Beta2","1.0.0.Beta20","1.0.0.Beta21","1.0.0.Beta22","1.0.0.Beta23","1.0.0.Beta24","1.0.0.Beta25","1.0.0.Beta26","1.0.0.Beta27","1.0.0.Beta28","1.0.0.Beta29","1.0.0.Beta3","1.0.0.Beta30","1.0.0.Beta31","1.0.0.Beta32","1.0.0.Beta33","1.0.0.Beta4","1.0.0.Beta5","1.0.0.Beta6","1.0.0.Beta7","1.0.0.Beta8","1.0.0.Beta9","1.0.0.CR1","1.0.0.CR2","1.0.0.CR3","1.0.0.CR4","1.0.0.CR5","1.0.0.Final","2.1.0.Final","2.1.1.Final","2.1.2.Final","2.1.3.Final","2.1.4.Final","2.1.5.Final","2.1.6.Final","2.1.7.Final","2.1.8.Final","2.2.0.Final","2.2.0.Final-JAKARTAEE9","2.2.1.Final","2.2.1.Final-JAKARTAEE9","2.2.2.Final","2.2.2.Final-JAKARTAEE9","2.2.3.Final","2.2.3.Final-JAKARTAEE9","2.2.4.Final","2.2.5.Final","2.2.6.Final","2.2.7.Final","2.2.8.Final","2.2.9.Final"],"database_specific":{"vanir_signatures":[{"signature_type":"Function","source":"https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877","signature_version":"v1","id":"CVE-2021-3690-45402648","deprecated":false,"digest":{"length":601,"function_hash":"187851407789216287730490246308857511865"},"target":{"function":"onFullPongMessage","file":"websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java"}},{"signature_type":"Line","source":"https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877","signature_version":"v1","id":"CVE-2021-3690-e32340ef","deprecated":false,"digest":{"line_hashes":["79403700335528539273770068144736272793","79857656579781679713873665099933085318","244125084856819352952595829882912148068","137441744319017044843376062865140644092"],"threshold":0.9},"target":{"file":"websockets-jsr/src/main/java/io/undertow/websockets/jsr/FrameHandler.java"}}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3690.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}