A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

It is possible to mitigate the vulnerability by performing an upper-level verification to ensure the content size sent server side is within the allowed parameters.

History

Wed, 21 Jan 2026 10:30:00 +0900


Wed, 14 Jan 2026 08:00:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:8.1::el8
cpe:/a:redhat:jboss_enterprise_application_platform:8.1::el9
References

Sat, 06 Dec 2025 09:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:8.0
References

Fri, 05 Dec 2025 08:00:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
References

Fri, 05 Dec 2025 03:15:00 +0900

Type Values Removed Values Added
References

Fri, 05 Dec 2025 01:15:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:8 cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
References

Thu, 04 Dec 2025 09:15:00 +0900

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 04 Dec 2025 06:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 04 Dec 2025 04:00:00 +0900

Type Values Removed Values Added
Description A flaw was found in Undertow that can cause remote denial of service attacks. When the server uses the FormEncodedDataDefinition.doParse(StreamSourceChannel) method to parse large form data encoding with application/x-www-form-urlencoded, the method will cause an OutOfMemory issue. This flaw allows unauthorized users to cause a remote denial of service (DoS) attack.
Title Undertow: outofmemory when parsing form data encoding with application/x-www-form-urlencoded
First Time appeared Redhat
Redhat amq Streams
Redhat apache Camel Hawtio
Redhat build Keycloak
Redhat camel Quarkus
Redhat camel Spring Boot
Redhat integration
Redhat jboss Data Grid
Redhat jboss Enterprise Application Platform
Redhat jboss Enterprise Bpms Platform
Redhat jboss Fuse
Redhat jboss Fuse Service Works
Redhat jbosseapxp
Redhat optaplanner
Redhat quarkus
Redhat red Hat Single Sign On
Redhat serverless
Redhat service Registry
Weaknesses CWE-20
CPEs cpe:/a:redhat:amq_streams:1
cpe:/a:redhat:apache_camel_hawtio:4
cpe:/a:redhat:build_keycloak:
cpe:/a:redhat:camel_quarkus:2
cpe:/a:redhat:camel_quarkus:3
cpe:/a:redhat:camel_spring_boot:3
cpe:/a:redhat:camel_spring_boot:4
cpe:/a:redhat:integration:1
cpe:/a:redhat:jboss_data_grid:7
cpe:/a:redhat:jboss_data_grid:8
cpe:/a:redhat:jboss_enterprise_application_platform:7
cpe:/a:redhat:jboss_enterprise_application_platform:8
cpe:/a:redhat:jboss_enterprise_bpms_platform:7
cpe:/a:redhat:jboss_fuse:7
cpe:/a:redhat:jboss_fuse_service_works:6
cpe:/a:redhat:jbosseapxp
cpe:/a:redhat:optaplanner:::el6
cpe:/a:redhat:quarkus:3
cpe:/a:redhat:red_hat_single_sign_on:7
cpe:/a:redhat:serverless:1
cpe:/a:redhat:service_registry:2
Vendors & Products Redhat
Redhat amq Streams
Redhat apache Camel Hawtio
Redhat build Keycloak
Redhat camel Quarkus
Redhat camel Spring Boot
Redhat integration
Redhat jboss Data Grid
Redhat jboss Enterprise Application Platform
Redhat jboss Enterprise Bpms Platform
Redhat jboss Fuse
Redhat jboss Fuse Service Works
Redhat jbosseapxp
Redhat optaplanner
Redhat quarkus
Redhat red Hat Single Sign On
Redhat serverless
Redhat service Registry
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-01-21T01:09:50.727Z

Reserved: 2024-04-16T13:30:53.755Z

Link: CVE-2024-3884

cve-icon Vulnrichment

Updated: 2025-12-03T20:50:19.755Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-03T19:15:54.767

Modified: 2026-01-21T01:15:49.317

Link: CVE-2024-3884

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-12-03T16:50:50Z

Links: CVE-2024-3884 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses