Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-0231

Опубликовано: 14 апр. 2019
Источник: redhat
CVSS3: 6.8
EPSS Низкий

Описание

Handling of the close_notify SSL/TLS message does not lead to a connection closure, leading the server to retain the socket opened and to have the client potentially receive clear text messages afterward. Mitigation: 2.0.20 users should migrate to 2.0.21, 2.1.0 users should migrate to 2.1.1. This issue affects: Apache MINA.

A cryptographic protocol integrity flaw was discovered in Apache Mina. The closure of a TLS session would not always result in closure of the socket, allowing the conversation to continue in clear text. This could undermine the confidentiality of a connection and potentially disclose sensitive information to third-party attackers.

Отчет

  • Red Hat OpenStack Platform's OpenDaylight versions 8-10 contain the vulnerable code. However, these OpenDaylight versions were released as technical preview with limited support and will therefore not be updated. Other OpenDaylight versions do not contain the vulnerable library.
  • This issue affects the version of apache-mina shipped with Red Hat Gluster Storage 3, as it contains the vulnerable functionality.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat BPM Suite 6mina-coreOut of support scope
Red Hat JBoss A-MQ 6mina-coreOut of support scope
Red Hat JBoss BRMS 5mina-coreOut of support scope
Red Hat JBoss BRMS 6mina-coreOut of support scope
Red Hat JBoss Data Virtualization 6mina-coreOut of support scope
Red Hat JBoss Fuse 6mina-coreOut of support scope
Red Hat JBoss Fuse Service Works 6mina-coreOut of support scope
Red Hat JBoss SOA Platform 5mina-coreOut of support scope
Red Hat OpenStack Platform 10 (Newton)opendaylightWill not fix
Red Hat OpenStack Platform 8 (Liberty)opendaylightWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-319
https://bugzilla.redhat.com/show_bug.cgi?id=1700016mina-core: Retaining an open socket in close_notify SSL-TLS leading to Information disclosure.

EPSS

Процентиль: 71%
0.00707
Низкий

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

Handling of the close_notify SSL/TLS message does not lead to a connection closure, leading the server to retain the socket opened and to have the client potentially receive clear text messages afterward. Mitigation: 2.0.20 users should migrate to 2.0.21, 2.1.0 users should migrate to 2.1.1. This issue affects: Apache MINA.

CVSS3: 7.5
nvd
почти 6 лет назад

Handling of the close_notify SSL/TLS message does not lead to a connection closure, leading the server to retain the socket opened and to have the client potentially receive clear text messages afterward. Mitigation: 2.0.20 users should migrate to 2.0.21, 2.1.0 users should migrate to 2.1.1. This issue affects: Apache MINA.

CVSS3: 7.5
debian
почти 6 лет назад

Handling of the close_notify SSL/TLS message does not lead to a connec ...

CVSS3: 7.5
redos
2 месяца назад

Уязвимость apache-mina

CVSS3: 7.5
github
больше 3 лет назад

Cleartext Transmission of Sensitive Information in Apache MINA

EPSS

Процентиль: 71%
0.00707
Низкий

6.8 Medium

CVSS3