Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-5632

Опубликовано: 18 окт. 2023
Источник: debian
EPSS Низкий

Описание

In Eclipse Mosquito before and including 2.0.5, establishing a connection to the mosquitto server without sending data causes the EPOLLOUT event to be added, which results excessive CPU consumption. This could be used by a malicious actor to perform denial of service type attack. This issue is fixed in 2.0.6

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mosquittofixed2.0.7-1package
mosquittonot-affectedbusterpackage

Примечания

  • https://github.com/eclipse/mosquitto/pull/2053

  • https://github.com/eclipse/mosquitto/commit/18bad1ff32435e523d7507e9b2ce0010124a8f2d (v2.0.6)

EPSS

Процентиль: 26%
0.00091
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

In Eclipse Mosquito before and including 2.0.5, establishing a connection to the mosquitto server without sending data causes the EPOLLOUT event to be added, which results excessive CPU consumption. This could be used by a malicious actor to perform denial of service type attack. This issue is fixed in 2.0.6

CVSS3: 6.5
redhat
больше 2 лет назад

In Eclipse Mosquito before and including 2.0.5, establishing a connection to the mosquitto server without sending data causes the EPOLLOUT event to be added, which results excessive CPU consumption. This could be used by a malicious actor to perform denial of service type attack. This issue is fixed in 2.0.6

CVSS3: 7.5
nvd
больше 2 лет назад

In Eclipse Mosquito before and including 2.0.5, establishing a connection to the mosquitto server without sending data causes the EPOLLOUT event to be added, which results excessive CPU consumption. This could be used by a malicious actor to perform denial of service type attack. This issue is fixed in 2.0.6

CVSS3: 7.5
github
больше 2 лет назад

In Eclipse Mosquito before and including 2.0.5, establishing a connection to the mosquitto server without sending data causes the EPOLLOUT event to be added, which results excessive CPU consumption. This could be used by a malicious actor to perform denial of service type attack. This issue is fixed in 2.0.6

EPSS

Процентиль: 26%
0.00091
Низкий