An issue was discovered in Barrier before 2.3.4. The barriers component (aka the server-side implementation of Barrier) does not correctly close file descriptors for established TCP connections. An unauthenticated remote attacker can thus cause file descriptor exhaustion in the server process, leading to denial of service.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/11/02/4 | Exploit Mailing List Third Party Advisory |
https://github.com/debauchee/barrier/releases/tag/v2.3.4 | Release Notes Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/11/02/4 | Exploit Mailing List Third Party Advisory |
https://github.com/debauchee/barrier/releases/tag/v2.3.4 | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 06:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2021/11/02/4 - Exploit, Mailing List, Third Party Advisory | |
References | () https://github.com/debauchee/barrier/releases/tag/v2.3.4 - Release Notes, Third Party Advisory |
Information
Published : 2021-11-08 04:15
Updated : 2024-11-21 06:27
NVD link : CVE-2021-42075
Mitre link : CVE-2021-42075
CVE.ORG link : CVE-2021-42075
JSON object : View
Products Affected
barrier_project
- barrier
CWE
CWE-772
Missing Release of Resource after Effective Lifetime