Vulnerability Name: | CVE-2022-0084 (CCN-234581) | ||||||||||||
Assigned: | 2022-07-07 | ||||||||||||
Published: | 2022-07-07 | ||||||||||||
Updated: | 2022-09-01 | ||||||||||||
Summary: | A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C)
| ||||||||||||
Vulnerability Type: | CWE-770 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-0084 Source: MISC Type: Vendor Advisory https://access.redhat.com/security/cve/CVE-2022-0084 Source: CCN Type: Red Hat Bugzilla - Bug 2064226 (CVE-2022-0084) - CVE-2022-0084 xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr Source: MISC Type: Issue Tracking, Vendor Advisory https://bugzilla.redhat.com/show_bug.cgi?id=2064226 Source: XF Type: UNKNOWN xnio-cve20220084-dos(234581) Source: MISC Type: Patch, Third Party Advisory https://github.com/xnio/xnio/commit/fdefb3b8b715d33387cadc4d48991fb1989b0c12 Source: CCN Type: XNIO GIT Repository Fix CVE-2022-0084 #291 Source: MISC Type: Patch, Third Party Advisory https://github.com/xnio/xnio/pull/291 Source: CCN Type: IBM Security Bulletin 6988643 (InfoSphere Information Server) IBM InfoSphere Information Server is affected but not classified as vulnerable to a denial of service vulnerability in XNIO (CVE-2022-0084) Source: CCN Type: Mend Vulnerability Database CVE-2022-0084 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |