{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-41172","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2024-07-17T13:38:34.414Z","datePublished":"2024-07-19T08:50:43.766Z","dateUpdated":"2024-09-13T17:05:12.209Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Apache CXF","vendor":"Apache Software Foundation","versions":[{"lessThan":"3.6.4, 4.0.5","status":"affected","version":"3.6.0, 4.0.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In versions of Apache CXF before 3.6.4 and 4.0.5 (3.5.x and lower versions are not impacted), a CXF HTTP client conduit may prevent HTTPClient instances from being garbage collected and it is possible that memory consumption will continue to increase, eventually causing the application to run  out of memory<br>"}],"value":"In versions of Apache CXF before 3.6.4 and 4.0.5 (3.5.x and lower versions are not impacted), a CXF HTTP client conduit may prevent HTTPClient instances from being garbage collected and it is possible that memory consumption will continue to increase, eventually causing the application to run  out of memory\n"}],"metrics":[{"other":{"content":{"text":"low"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-401","description":"CWE-401 Missing Release of Memory after Effective Lifetime","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2024-07-19T08:50:43.766Z"},"references":[{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6"}],"source":{"discovery":"UNKNOWN"},"title":"Apache CXF: Unrestricted memory consumption in CXF HTTP clients","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"affected":[{"vendor":"apache","product":"cxf","cpes":["cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"3.6.0","status":"affected","lessThan":"3.6.4","versionType":"semver"},{"version":"4.0.0","status":"affected","lessThan":"4.0.5","versionType":"semver"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-07-23T17:58:41.172215Z","id":"CVE-2024-41172","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-24T18:59:47.054Z"}},{"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6"},{"url":"https://security.netapp.com/advisory/ntap-20240808-0008/"},{"url":"http://www.openwall.com/lists/oss-security/2024/07/18/4"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-09-13T17:05:12.209Z"}}]}}