CVE-2019-19343

7.5 HIGH

📋 TL;DR

CVE-2019-19343 is a memory leak vulnerability in Undertow's HttpOpenListener when using Remoting in Red Hat JBoss EAP. This flaw allows attackers to cause denial of service by exhausting server memory through holding remote connections indefinitely. Organizations running vulnerable versions of JBoss EAP before 7.2.4 are affected.

💻 Affected Systems

Products:
  • Red Hat JBoss Enterprise Application Platform (EAP)
  • Undertow
  • JBoss Remoting
Versions: JBoss EAP before 7.2.4, Undertow before 2.0.25.SP1, JBoss Remoting before 5.0.14.SP1
Operating Systems: All operating systems running affected JBoss versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects configurations using Remoting with Undertow. The vulnerability is in the HttpOpenListener component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage due to memory exhaustion, potentially affecting all applications hosted on the vulnerable JBoss instance.

🟠

Likely Case

Degraded performance and intermittent service disruptions as memory consumption increases over time.

🟢

If Mitigated

Minimal impact with proper monitoring and resource limits in place, though risk remains until patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires establishing and maintaining multiple connections to trigger the memory leak. No authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: JBoss EAP 7.2.4, Undertow 2.0.25.SP1, JBoss Remoting 5.0.14.SP1

Vendor Advisory: https://access.redhat.com/security/cve/cve-2019-19343

Restart Required: Yes

Instructions:

1. Apply Red Hat security patch for JBoss EAP 7.2.4 or later. 2. Update Undertow to 2.0.25.SP1 or later. 3. Update JBoss Remoting to 5.0.14.SP1 or later. 4. Restart all JBoss services.

🔧 Temporary Workarounds

Connection Timeout Configuration

all

Configure connection timeouts to limit how long idle connections can remain open.

Set undertow.connection-idle-timeout in standalone.xml or domain.xml

Resource Limits

linux

Implement memory and connection limits at the OS or container level.

Use ulimit on Linux or equivalent resource constraints

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to vulnerable JBoss instances
  • Deploy monitoring with alerts for abnormal memory consumption patterns

🔍 How to Verify

Check if Vulnerable:

Check JBoss EAP version with: $JBOSS_HOME/bin/standalone.sh --version

Check Version:

$JBOSS_HOME/bin/standalone.sh --version | grep 'JBoss EAP'

Verify Fix Applied:

Verify version is 7.2.4 or higher and check patch installation via Red Hat Package Manager

📡 Detection & Monitoring

Log Indicators:

  • Increasing memory usage patterns in JBoss logs
  • Connection timeout errors
  • OutOfMemoryError exceptions

Network Indicators:

  • Unusually high number of persistent connections to JBoss ports
  • Increased network traffic without corresponding application activity

SIEM Query:

source="jboss.log" AND ("OutOfMemoryError" OR "memory leak" OR "connection timeout")

🔗 References

📤 Share & Export