Description
Apache James prior to release 3.6.3 and 3.7.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. Fix of CVE-2021-38542, which solved similar problem fron Apache James 3.6.1, is subject to a parser differential and do not take into account concurrent requests.
Published: 2022-09-08
Score: 7.5 High
EPSS: 1.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Upgrade to Apache James 3.7.1 or Apache James 3.6.3.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-6956 Apache James prior to release 3.6.3 and 3.7.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. Fix of CVE-2021-38542, which solved similar problem fron Apache James 3.6.1, is subject to a parser differential and do not take into account concurrent requests.
Github GHSA Github GHSA GHSA-w45j-f5g5-w94x Apache James vulnerable to buffering attack
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-03T05:48:37.476Z

Reserved: 2022-03-30T00:00:00.000Z

Link: CVE-2022-28220

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-09-08T08:15:07.813

Modified: 2024-11-21T06:56:58.570

Link: CVE-2022-28220

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses