<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Netty-Codec (&lt;= 4.1.132.Final) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/netty-codec--4.1.132.final/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 00:20:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/netty-codec--4.1.132.final/feed.xml" rel="self" type="application/rss+xml"/><item><title>Netty Lz4FrameDecoder Resource Exhaustion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-netty-lz4-resource-exhaustion/</link><pubDate>Thu, 07 May 2026 00:20:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netty-lz4-resource-exhaustion/</guid><description>Netty's Lz4FrameDecoder is vulnerable to resource exhaustion, where an attacker can cause excessive memory allocation by sending a small, crafted header, leading to a denial-of-service condition; this affects netty-codec-compression versions up to 4.2.12.Final and netty-codec versions up to 4.1.132.Final.</description><content:encoded><![CDATA[<p>The Netty framework is susceptible to a resource exhaustion vulnerability in its Lz4FrameDecoder. This vulnerability stems from the decoder&rsquo;s reliance on header fields for buffer sizing. An attacker can exploit this by sending a minimal (22-byte) crafted header that specifies a large decompressed length (up to 32MB per block). This forces the server to allocate an unnecessarily large ByteBuf before the LZ4 decompression even occurs, consuming significant memory resources. The vulnerability affects netty-codec-compression versions up to 4.2.12.Final and netty-codec versions up to 4.1.132.Final. By repeatedly sending these malicious headers, an attacker can exhaust server memory, leading to a denial-of-service condition. This is especially critical in environments where Netty is used to handle network communications and where untrusted clients are allowed to connect.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker establishes a network connection to a Netty-based server using the affected Lz4FrameDecoder.</li>
<li>The attacker crafts a malicious LZ4 frame header, setting the <code>decompressedLength</code> field to a large value (e.g., 32MB). The complete header can be as small as 22 bytes.</li>
<li>The attacker sends the crafted header to the server.</li>
<li>The Lz4FrameDecoder on the server receives the header and allocates a ByteBuf based on the attacker-controlled <code>decompressedLength</code> value.</li>
<li>The decoder attempts to decompress the (nonexistent or minimal) compressed data, which may trigger an <code>IndexOutOfBoundsException</code> or other decompression error.</li>
<li>The server&rsquo;s memory resources are consumed by the allocated ByteBuf, even if the decompression fails.</li>
<li>The attacker repeats steps 3-6 to continuously allocate memory.</li>
<li>The server&rsquo;s memory is exhausted, leading to a denial-of-service condition for legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service (DoS) condition. An attacker can exhaust the server&rsquo;s memory resources by sending a series of small, malicious requests. The number of victims would depend on the deployment of the Netty framework and the exposure of vulnerable services to untrusted clients. The sectors most affected are those relying on Netty for network communication, such as messaging platforms, application servers, and data streaming services. If the attack succeeds, the affected service becomes unavailable, disrupting normal operations and potentially leading to data loss or service outages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a non-vulnerable version of <code>io.netty:netty-codec-compression</code> (greater than 4.2.12.Final) or <code>io.netty:netty-codec</code> (greater than 4.1.132.Final) to patch CVE-2026-42583.</li>
<li>Implement per-channel and aggregate limits on incoming data and memory allocation to mitigate the impact of resource exhaustion attacks.</li>
<li>Monitor network traffic for unusually small LZ4 frames with excessively large declared decompressed lengths. Deploy the <code>Netty Lz4 Frame Decoder Large Allocation</code> Sigma rule to your SIEM to detect this pattern.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>resource-exhaustion</category><category>denial-of-service</category><category>netty</category></item></channel></rss>