Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS13NDVqLWY1ZzUtdzk0eM4AAurf
Apache James vulnerable to buffering attack
Apache James prior to release 3.6.3 and 3.7.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. Fix of CVE-2021-38542, which solved similar problem fron Apache James 3.6.1, is subject to a parser differential and do not take into account concurrent requests.
Permalink: https://github.com/advisories/GHSA-w45j-f5g5-w94xJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13NDVqLWY1ZzUtdzk0eM4AAurf
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: about 1 year ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-w45j-f5g5-w94x, CVE-2022-28220
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-28220
- https://james.apache.org/james/update/2022/08/26/james-3.7.1.html
- http://www.openwall.com/lists/oss-security/2022/09/20/1
- https://github.com/advisories/GHSA-w45j-f5g5-w94x
Affected Packages
maven:org.apache.james:james-server
Dependent packages: 1Dependent repositories: 15
Downloads:
Affected Version Ranges: = 3.7.0, < 3.6.3
Fixed in: 3.7.1, 3.6.3
All affected versions: 3.0.0, 3.0.1, 3.1.0, 3.2.0, 3.3.0, 3.4.0, 3.5.0, 3.6.0, 3.6.2, 3.7.0
All unaffected versions: 3.7.1, 3.7.2, 3.7.3, 3.7.4, 3.7.5, 3.8.0, 3.8.1