CVE Vulnerabilities

CVE-2023-26438

Time-of-check Time-of-use (TOCTOU) Race Condition

Published: Aug 02, 2023 | Modified: Jan 12, 2024
CVSS 3.x
3.1
LOW
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

External service lookups for a number of protocols were vulnerable to a time-of-check/time-of-use (TOCTOU) weakness, involving the JDK DNS cache. Attackers that were timing DNS cache expiry correctly were able to inject configuration that would bypass existing network deny-lists. Attackers could exploit this weakness to discover the existence of restricted network infrastructure and service availability. Improvements were made to include deny-lists not only during the check of the provided connection data, but also during use. No publicly available exploits are known.

Weakness

The product checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.

Affected Software

Name Vendor Start Version End Version
Open-xchange_appsuite_backend Open-xchange 7.10.6 (including) 7.10.6 (including)
Open-xchange_appsuite_backend Open-xchange 8.10.0 (including) 8.10.0 (including)

Potential Mitigations

References