The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Spring Framework: memory leak via StringDecoder

Synthesis of the vulnerability 

An attacker can create a memory leak via StringDecoder of Spring Framework, in order to trigger a denial of service.
Vulnerable products: Spring Framework.
Severity of this weakness: 2/4.
Creation date: 14/01/2020.
Références of this bulletin: 24339, 24346, VIGILANCE-VUL-31320.

Description of the vulnerability 

An attacker can create a memory leak via StringDecoder of Spring Framework, in order to trigger a denial of service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This security bulletin impacts software or systems such as Spring Framework.

Our Vigil@nce team determined that the severity of this cybersecurity announce is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this vulnerability alert.

Solutions for this threat 

Spring Framework: version 5.2.3.
The version 5.2.3 is fixed:
  https://github.com/spring-projects/spring-framework/releases/tag/v5.2.3.RELEASE

Spring Framework: version 5.1.13.
The version 5.1.13 is fixed:
  https://github.com/spring-projects/spring-framework/releases/tag/v5.1.13.RELEASE

Spring Framework: patch for StringDecoder.
A patch is indicated in information sources.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a system vulnerability watch. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.