First published: Thu Jan 12 2023(Updated: )
A flaw was discovered in the DTLS in JSSE component of OpenJDK, allowing malicious clients to make a DTLS server consume excessive resources by repeatedly transmitting a series of handshake initiation requests. The malicious client could also use this flaw to send pre-generated messages with a spoofed source, causing the server to send replies to a victim machine, thus potentially flooding it.
Affected Software | Affected Version | How to fix |
---|---|---|
Sun JSSE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2160421 is considered high due to its potential to exhaust server resources.
The affected software for REDHAT-BUG-2160421 is the DTLS component of OpenJDK's JSSE.
To fix REDHAT-BUG-2160421, update your OpenJDK to the latest patched version provided by Red Hat.
Yes, attackers can exploit REDHAT-BUG-2160421 remotely by sending malicious DTLS handshake requests.
REDHAT-BUG-2160421 causes DTLS servers to consume excessive resources, potentially leading to denial-of-service conditions.