Apache James prior to release 3.6.3 and 3.7.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. Fix of CVE-2021-38542, which solved similar problem fron Apache James 3.6.1, is subject to a parser differential and do not take into account concurrent requests.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6956 | Apache James prior to release 3.6.3 and 3.7.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. Fix of CVE-2021-38542, which solved similar problem fron Apache James 3.6.1, is subject to a parser differential and do not take into account concurrent requests. |
Github GHSA |
GHSA-w45j-f5g5-w94x | Apache James vulnerable to buffering attack |
Fixes
Solution
No solution given by the vendor.
Workaround
Upgrade to Apache James 3.7.1 or Apache James 3.6.3.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T05:48:37.476Z
Reserved: 2022-03-30T00:00:00
Link: CVE-2022-28220
No data.
Status : Modified
Published: 2022-09-08T08:15:07.813
Modified: 2024-11-21T06:56:58.570
Link: CVE-2022-28220
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA