Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS13NDVqLWY1ZzUtdzk0eM4AAurf

Apache James vulnerable to buffering attack

Apache James prior to release 3.6.3 and 3.7.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. Fix of CVE-2021-38542, which solved similar problem fron Apache James 3.6.1, is subject to a parser differential and do not take into account concurrent requests.

Permalink: https://github.com/advisories/GHSA-w45j-f5g5-w94x
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13NDVqLWY1ZzUtdzk0eM4AAurf
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: about 1 year ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-w45j-f5g5-w94x, CVE-2022-28220
References: Blast Radius: 8.8

Affected Packages

maven:org.apache.james:james-server
Dependent packages: 1
Dependent repositories: 15
Downloads:
Affected Version Ranges: = 3.7.0, < 3.6.3
Fixed in: 3.7.1, 3.6.3
All affected versions: 3.0.0, 3.0.1, 3.1.0, 3.2.0, 3.3.0, 3.4.0, 3.5.0, 3.6.0, 3.6.2, 3.7.0
All unaffected versions: 3.7.1, 3.7.2, 3.7.3, 3.7.4, 3.7.5, 3.8.0, 3.8.1