CVE-2015-2080
Publication date 7 October 2016
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| jetty | ||
| 14.04 LTS trusty |
Not affected
|
|
| jetty8 | ||
| 14.04 LTS trusty |
Not affected
|
|
Notes
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | None |
| Availability impact | None |
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Other references
- http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00074.html
- https://github.com/eclipse/jetty.project/blob/master/advisories/2015-02-24-httpparser-error-buffer-bleed.md
- http://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html
- https://www.cve.org/CVERecord?id=CVE-2015-2080