Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-27222

Опубликовано: 03 фев. 2021
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

In Eclipse Californium version 2.3.0 to 2.6.0, the certificate based (x509 and RPK) DTLS handshakes accidentally fails, because the DTLS server side sticks to a wrong internal state. That wrong internal state is set by a previous certificate based DTLS handshake failure with TLS parameter mismatch. The DTLS server side must be restarted to recover this. This allow clients to force a DoS.

A flaw was found in californium. The certificate based (x509 and RPK) DTLS handshakes fails due to the DTLS server side being set to a wrong internal state by a previous certificate based DTLS handshake failure with TLS parameter mismatch. The highest threat from this vulnerability is to system availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7californium-coreAffected
Red Hat JBoss Fuse 6californium-coreNot affected
Red Hat Integrationcalifornium-coreFixedRHSA-2021:320518.08.2021
Red Hat Integration Camel Quarkus 2californium-coreFixedRHSA-2021:320718.08.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-372
https://bugzilla.redhat.com/show_bug.cgi?id=1930230californium-core: DTLS - DoS vulnerability for certificate based handshakes

EPSS

Процентиль: 45%
0.00226
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
около 5 лет назад

In Eclipse Californium version 2.3.0 to 2.6.0, the certificate based (x509 and RPK) DTLS handshakes accidentally fails, because the DTLS server side sticks to a wrong internal state. That wrong internal state is set by a previous certificate based DTLS handshake failure with TLS parameter mismatch. The DTLS server side must be restarted to recover this. This allow clients to force a DoS.

github
больше 3 лет назад

In Eclipse Californium version 2.3.0 to 2.6.0, the certificate based (x509 and RPK) DTLS handshakes accidentally fails, because it sticks to a wrong internal state. That wrong internal state is set by a previous certificate based DTLS handshakes failure with TLS parameter mismatch. The server must be restarted to recover this. This allow clients to force a DoS.

EPSS

Процентиль: 45%
0.00226
Низкий

7.5 High

CVSS3