org.eclipse.californium:scandium@2.4.1 vulnerabilities
-
latest version
3.11.0
-
latest non vulnerable version
-
first published
10 years ago
-
latest version published
2 months ago
-
licenses detected
- [1.0.0-M2,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.eclipse.californium:scandium package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.eclipse.californium:scandium is a library for exchanging data using DTLS over UDP. Affected versions of this package are vulnerable to Denial of Service (DoS) in DTLS connection handling performed by NOTE: Exploiting this vulnerability is only possible when How to fix Denial of Service (DoS)? Upgrade |
[2.0.0,2.7.3)
[3.0.0,3.6.0)
|
org.eclipse.californium:scandium is a library for exchanging data using DTLS over UDP. Affected versions of this package are vulnerable to Signature Validation Bypass. If the signature is not included in How to fix Signature Validation Bypass? Upgrade |
[2.0.0,2.6.5)
[3.0.0-M1,3.0.0-M4)
|
org.eclipse.californium:scandium is a library for exchanging data using DTLS over UDP. Affected versions of this package are vulnerable to Denial of Service (DoS). The certificate based (x509 and RPK) DTLS handshakes accidentally fails, because it sticks to a wrong internal state. That wrong internal state is set by a previous certificate based DTLS handshakes failure with TLS parameter mismatch. The server must be restarted to recover this. This allow clients to force a DoS. How to fix Denial of Service (DoS)? Upgrade |
[2.3.0,2.6.1)
|