VYPR
High severityNVD Advisory· Published Mar 27, 2019· Updated Aug 5, 2024

CVE-2018-12545

CVE-2018-12545

Description

In Eclipse Jetty version 9.3.x and 9.4.x, the server is vulnerable to Denial of Service conditions if a remote client sends either large SETTINGs frames container containing many settings, or many small SETTINGs frames. The vulnerability is due to the additional CPU and memory allocations required to handle changed settings.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Eclipse Jetty 9.3.x and 9.4.x vulnerable to DoS via CPU/memory exhaustion from crafted HTTP/2 SETTINGS frames.

Vulnerability

In Eclipse Jetty versions 9.3.x (up to 9.3.24.v20180605) and 9.4.x (up to 9.4.12.RC2), the HTTP/2 implementation fails to properly limit resource consumption when processing SETTINGS frames. A remote client can cause excessive CPU and memory allocation by sending either a large SETTINGS frame containing many settings or many small SETTINGS frames [1][3]. The issue is due to the additional processing required for each changed setting [1].

Exploitation

An unauthenticated remote attacker can exploit this vulnerability by establishing an HTTP/2 connection and sending a crafted sequence of SETTINGS frames. No special network position or user interaction is required; the attacker only needs to be able to send network traffic to the Jetty server [1]. The attack can be performed with either a single large SETTINGS frame containing many settings or a rapid succession of small SETTINGS frames [1].

Impact

Successful exploitation leads to a Denial of Service (DoS) condition. The server becomes unresponsive or crashes due to exhaustion of CPU time and memory, preventing legitimate users from accessing services [1]. The vulnerability does not allow for arbitrary code execution or data disclosure; its sole impact is on availability.

Mitigation

The vulnerability is fixed in Jetty versions 9.3.25.v20180904 and 9.4.12.v20180830 [3]. Users should upgrade to these or later versions. If immediate upgrade is not possible, network-level filters or rate-limiting of HTTP/2 connections may reduce exposure, but no official workaround is provided by the vendor.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.eclipse.jetty:jetty-serverMaven
>= 9.4.0, < 9.4.12.v201808309.4.12.v20180830
org.eclipse.jetty:jetty-serverMaven
>= 9.3.0, < 9.3.25.v201809049.3.25.v20180904

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

17

News mentions

0

No linked articles in our index yet.