org.eclipse.californium:scandium@3.2.0 vulnerabilities

  • latest version

    3.11.0

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    2 months ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the org.eclipse.californium:scandium package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Denial of Service (DoS)

org.eclipse.californium:scandium is a library for exchanging data using DTLS over UDP.

Affected versions of this package are vulnerable to Denial of Service (DoS) due to failing DTLS handshakes, which leads to improper cleanup of counters for throttling, resulting in the permanent dropping of records.

Note:

The issue was reported for certificate-based handshakes, but may also affect PSK-based handshakes. It generally affects client and server as well.

How to fix Denial of Service (DoS)?

Upgrade org.eclipse.californium:scandium to version 2.7.4, 3.7.0 or higher.

[2.7.0,2.7.4) [3.0.0,3.7.0)
  • H
Denial of Service (DoS)

org.eclipse.californium:scandium is a library for exchanging data using DTLS over UDP.

Affected versions of this package are vulnerable to Denial of Service (DoS) in DTLS connection handling performed by DTLSConnector.java and ResumingServerHandshaker.java. An attacker can cause traffic to be sent to a forged address without properly verifying with a HelloVerifyRequest first, allowing resource consumption (ServerHello message amplification and CPU load) to a degree that can deny service to the affected system.

NOTE: Exploiting this vulnerability is only possible when DTLS_VERIFY_PEERS_ON_RESUMPTION_THRESHOLD is set to a value larger than 0.

How to fix Denial of Service (DoS)?

Upgrade org.eclipse.californium:scandium to version 2.7.3, 3.6.0 or higher.

[2.0.0,2.7.3) [3.0.0,3.6.0)