First published: Thu Sep 08 2022(Updated: )
Apache James prior to release 3.6.3 and 3.7.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. Fix of CVE-2021-38542, which solved similar problem fron Apache James 3.6.1, is subject to a parser differential and do not take into account concurrent requests.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache James | <=3.6.2 | |
Apache James | =3.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-28220.
The severity of CVE-2022-28220 is high with a severity value of 7.5.
Apache James versions up to and including 3.6.2, as well as version 3.7.0, are affected by CVE-2022-28220.
To fix CVE-2022-28220, it is recommended to update Apache James to version 3.6.3 or 3.7.1.
More information about CVE-2022-28220 can be found at the following references: [Link 1](http://www.openwall.com/lists/oss-security/2022/09/20/1), [Link 2](https://james.apache.org/james/update/2022/08/26/james-3.7.1.html).