First published: Wed Nov 09 2022(Updated: )
A flaw was found in the Eclipse Californium Scandium package. This issue occurs when failing handshakes don't clean up counters for throttling, causing the threshold to be reached without being released again, resulting in a denial of service. An attacker could submit a high quantity of server requests, leaving the server unable to respond.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Californium | <2.7.4 | |
Eclipse Californium | >=3.0.0<3.7.0 |
https://github.com/eclipse-californium/californium/commit/5648a0c27c2c2667c98419254557a14bac2b1f3f
https://github.com/eclipse-californium/californium/commit/726bac57659410da463dcf404b3e79a7312ac0b9
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39368 is a vulnerability in the Eclipse Californium Scandium package that allows for a Denial of Service attack.
CVE-2022-39368 has a severity rating of 8.2 (High).
CVE-2022-39368 affects versions of Eclipse Californium prior to 3.7.0 and 2.7.4, allowing for Denial of Service attacks.
To fix CVE-2022-39368, upgrade to Eclipse Californium version 3.7.0 or higher, or version 2.7.4 or higher.
More information about CVE-2022-39368 can be found at the following references: [CVE website](https://www.cve.org/CVERecord?id=CVE-2022-39368), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-39368), [GitHub Security Advisory](https://github.com/eclipse-californium/californium/security/advisories/GHSA-p72g-cgh9-ghjgc), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2145205), [Red Hat Errata](https://access.redhat.com/errata/RHSA-2023:2100).