### ImpactRemote DOS attack can cause out of memory ### DescriptionThere exists a security vulnerability in Jetty's `ThreadLimitHandler.getRemote()` whichcan be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. Byrepeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust theserver's memory.### Affected Versions* Jetty 12.0.0-12.0.8 (Supported)* Jetty 11.0.0-11.0.23 (EOL)* Jetty 10.0.0-10.0.23 (EOL)* Jetty 9.3.12-9.4.55 (EOL)### Patched Versions* Jetty 12.0.9* Jetty 11.0.24* Jetty 10.0.24* Jetty 9.4.56### WorkaroundsDo not use `ThreadLimitHandler`. Consider use of `QoSHandler` instead to artificially limit resource utilization.### ReferencesJetty 12 - https://github.com/jetty/jetty.project/pull/11723
Fix available through Seal Security. No upgrade required, protect your application instantly.
Fix without upgrading