Eclipse Californium denial of service (DoS) via Datagram Transport Layer Security (DTLS) handshake on parameter mismatch
High severity
GitHub Reviewed
Published
Jul 30, 2022
to the GitHub Advisory Database
•
Updated Apr 19, 2023
Package
Affected versions
>= 2.0.0, <= 2.7.2
>= 3.0.0, <= 3.5.0
Patched versions
2.7.3
3.6.0
Description
Published by the National Vulnerability Database
Jul 29, 2022
Published to the GitHub Advisory Database
Jul 30, 2022
Reviewed
Aug 10, 2022
Last updated
Apr 19, 2023
In Eclipse Californium versions 2.0.0 to 2.7.2 and 3.0.0-3.5.0 a DTLS resumption handshake falls back to a DTLS full handshake on a parameter mismatch without using a HelloVerifyRequest. Especially, if used with certificate based cipher suites, that results in message amplification (DDoS other peers) and high CPU load (DoS own peer). The misbehavior occurs only with DTLS_VERIFY_PEERS_ON_RESUMPTION_THRESHOLD values larger than 0.
References