CVE-2023-1108 - Loop with Unreachable Exit Condition ('Infinite Loop')

Severity

75%

Complexity

39%

Confidentiality

60%

A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.

CVSS 3.1 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

Demo Examples

Loop with Unreachable Exit Condition ('Infinite Loop')

CWE-835

In the following code the method processMessagesFromServer attempts to establish a connection to a server and read and process messages from the server. The method uses a do/while loop to continue trying to establish the connection to the server when an attempt fails.


               
}
...// create socket to connect to server
}// establish connection to server// if connected then read and process messages from server
...// read and process messages
// keep trying to establish connection to the server// close socket and return success or failure

However, this will create an infinite loop if the server does not respond. This infinite loop will consume system resources and can be used to create a denial of service attack. To resolve this a counter should be used to limit the number of attempts to establish a connection to the server, as in the following code.


               
}
...// initialize number of attempts counter
}// establish connection to server// increment counter// if connected then read and process messages from server
...// read and process messages
// keep trying to establish connection to the server// up to a maximum number of attempts// close socket and return success or failure

Loop with Unreachable Exit Condition ('Infinite Loop')

CWE-835

For this example the method isReorderNeeded as part of a bookstore application that determines if a particular book needs to be reordered based on the current inventory count and the rate at which the book is being sold.


               
}
return isReorder;// get inventory count for book// find number of days until inventory count reaches minimum
days++;
// if number of days within reorder timeframe// set reorder return boolean to true
isReorder = true;

However, the while loop will become an infinite loop if the rateSold input parameter has a value of zero since the inventoryCount will never fall below the minimumCount. In this case the input parameter should be validated to ensure that a value of zero does not cause an infinite loop,as in the following code.


               
}
...// validate rateSold variable
return isReorder;

Overview

Type

Red Hat

First reported 1 year ago

2023-09-14 15:15:00

Last updated 1 year ago

2023-11-16 00:46:00

Affected Software

Red Hat Decision Manager 7.0

7.0

Red Hat Single Sign-on Text-only Edition

Red Hat Process Automation 7.0

7.0

Red Hat Undertow

References

https://access.redhat.com/errata/RHSA-2023:3892

https://access.redhat.com/errata/RHSA-2023:1184

https://access.redhat.com/errata/RHSA-2023:1185

https://access.redhat.com/security/cve/CVE-2023-1108

https://bugzilla.redhat.com/show_bug.cgi?id=2174246

https://access.redhat.com/errata/RHSA-2023:1516

https://access.redhat.com/errata/RHSA-2023:3885

https://access.redhat.com/errata/RHSA-2023:3884

https://access.redhat.com/errata/RHSA-2023:3883

https://access.redhat.com/errata/RHSA-2023:1513

https://access.redhat.com/errata/RHSA-2023:1514

https://access.redhat.com/errata/RHSA-2023:3888

https://access.redhat.com/errata/RHSA-2023:3954

https://access.redhat.com/errata/RHSA-2023:1512

https://access.redhat.com/errata/RHSA-2023:4612

https://access.redhat.com/errata/RHSA-2023:3892

Vendor Advisory

https://access.redhat.com/errata/RHSA-2023:1184

Vendor Advisory

https://access.redhat.com/errata/RHSA-2023:1185

Vendor Advisory

https://access.redhat.com/security/cve/CVE-2023-1108

Vendor Advisory

https://bugzilla.redhat.com/show_bug.cgi?id=2174246

Issue Tracking

https://access.redhat.com/errata/RHSA-2023:1516

Vendor Advisory

https://access.redhat.com/errata/RHSA-2023:3885

Vendor Advisory

https://access.redhat.com/errata/RHSA-2023:3884

Vendor Advisory

https://access.redhat.com/errata/RHSA-2023:3883

Vendor Advisory

https://access.redhat.com/errata/RHSA-2023:1513

Vendor Advisory

https://access.redhat.com/errata/RHSA-2023:1514

Vendor Advisory

https://access.redhat.com/errata/RHSA-2023:3888

Vendor Advisory

https://access.redhat.com/errata/RHSA-2023:3954

Vendor Advisory

https://access.redhat.com/errata/RHSA-2023:1512

Vendor Advisory

https://access.redhat.com/errata/RHSA-2023:4612

Vendor Advisory

https://security.netapp.com/advisory/ntap-20231020-0002/

https://security.netapp.com/advisory/ntap-20231020-0002/

Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.