Vulnerability in Jetty Web Server 'Buffer Bleed'

Number: AV15-017
Date: 25 February 2015


The purpose of this advisory is to bring attention to a vulnerability in Jetty Web Server.


CCIRC is aware of vulnerability in Jetty Web Server that could expose private data to a remote unauthenticated attacker through an incorrect implementation of a debugging function. It could potentially expose data from server side buffers. This could allow a remote attacker to capture data in HTTP header and POST traffic. Jetty is a commonly used web server and found in many large open source projects and enterprise applications.

CVE Reference: CVE-2015-2080

Suggested Action

CCIRC recommends that system administrators test and deploy the vendor-released updates to affected applications accordingly.


Note to Readers

In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.

Please note, CCIRC PGP key has recently been updated.

For general information, please contact Public Safety Canada's Public Affairs division at:

Telephone: 613-944-4875 or 1-800-830-3118
Fax: 613-998-9589

Date modified: