A vulnerability in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages.
References
Link | Resource |
---|---|
https://docs.google.com/presentation/d/1eZznIciFI06_5UJrXvlLugH2-nmjfYpQO5NyNMc9RxU/edit?usp=sharing | Third Party Advisory |
https://docs.google.com/presentation/d/1eZznIciFI06_5UJrXvlLugH2-nmjfYpQO5NyNMc9RxU/edit?usp=sharing | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.google.com/presentation/d/1eZznIciFI06_5UJrXvlLugH2-nmjfYpQO5NyNMc9RxU/edit?usp=sharing - Third Party Advisory |
Information
Published : 2021-12-16 20:15
Updated : 2024-11-21 05:27
NVD link : CVE-2020-35210
Mitre link : CVE-2020-35210
CVE.ORG link : CVE-2020-35210
JSON object : View
Products Affected
atomix
- atomix
CWE
CWE-770
Allocation of Resources Without Limits or Throttling