UBUNTU-CVE-2014-0193

Source
https://ubuntu.com/security/CVE-2014-0193
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-0193.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2014-0193
Upstream
  • CVE-2014-0193
Withdrawn
2025-07-18T16:42:58Z
Published
2014-05-06T14:55:00Z
Modified
2025-07-16T07:17:12.792208Z
Severity
  • Ubuntu - low
Summary
[none]
Details

WebSocket08FrameDecoder in Netty 3.6.x before 3.6.9, 3.7.x before 3.7.1, 3.8.x before 3.8.2, 3.9.x before 3.9.1, and 4.0.x before 4.0.19 allows remote attackers to cause a denial of service (memory consumption) via a TextWebSocketFrame followed by a long stream of ContinuationWebSocketFrames.

References

Affected packages

Ubuntu:16.04:LTS / netty

Package

Name
netty
Purl
pkg:deb/ubuntu/netty@1:4.0.34-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.0.34-1

Affected versions

1:3.*
1:3.2.6.Final-2
1:4.*
1:4.0.32-1
1:4.0.33-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:4.0.34-1",
            "binary_name": "libnetty-java"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-0193.json"

Ubuntu:18.04:LTS / netty

Package

Name
netty
Purl
pkg:deb/ubuntu/netty@1:4.1.7-4?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.1.7-4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:4.1.7-4",
            "binary_name": "libnetty-java"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-0193.json"