CVE-2015-2080
Publication date 7 October 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.
Status
Package | Ubuntu Release | Status |
---|---|---|
jetty | ||
14.04 LTS trusty |
Not affected
|
|
jetty8 | ||
14.04 LTS trusty |
Not affected
|
|
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Other references
- http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00074.html
- https://github.com/eclipse/jetty.project/blob/master/advisories/2015-02-24-httpparser-error-buffer-bleed.md
- http://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html
- https://www.cve.org/CVERecord?id=CVE-2015-2080