An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attemps to load a file that does not exist. If an attacker creates such a large file, the Netty application crash.
A similar issue was previously reported in https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit.
The PoC is the same as for https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv with the detail that the file should only contain null-bytes; 0x00.
When the null-bytes are encountered by the InputStreamReader
, it will issue replacement characters in its charset decoding, which will fill up the line-buffer in the BufferedReader.readLine()
, because the replacement character is not a line-break character.
Impact is the same as https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv
{ "nvd_published_at": "2025-02-10T22:15:38Z", "cwe_ids": [ "CWE-400" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-02-10T18:14:47Z" }