First published: Mon Apr 15 2019(Updated: )
Handling of the close_notify SSL/TLS message does not lead to a connection closure, leading the server to retain the socket opened and to have the client potentially receive clear text messages afterward. Mitigation: 2.0.20 users should migrate to 2.0.21, 2.1.0 users should migrate to 2.1.1. This issue affects: Apache MINA.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache MINA | =2.0.20 | |
Apache MINA | =2.1.1 | |
redhat/apache-mina | <2.0.21 | 2.0.21 |
redhat/apache-mina | <2.1.1 | 2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0231 is a vulnerability in the handling of the close_notify SSL/TLS message that does not lead to a connection closure, potentially allowing the client to receive clear text messages afterward.
The severity of CVE-2019-0231 is high, with a severity value of 7.5.
CVE-2019-0231 affects Apache MINA versions 2.0.20 and 2.1.1, with users of these versions advised to migrate to 2.0.21 and 2.1.1 respectively.
The mitigation for CVE-2019-0231 is for 2.0.20 users to migrate to 2.0.21, and for 2.1.0 users to migrate to 2.1.1.
You can find more information about CVE-2019-0231 at the following references: [1] [2] [3].