Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6628-q6j9-w8vg

Опубликовано: 06 июл. 2023
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

gRPC Reachable Assertion issue

There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2:

te: x (x != trailers)

:scheme: x (x != http, https)

grpclb_client_stats: x (x == anything)

On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.

Пакеты

Наименование

io.grpc:grpc-protobuf

maven
Затронутые версииВерсия исправления

>= 1.51.0, < 1.53.0

1.53.0

Наименование

grpcio

pip
Затронутые версииВерсия исправления

>= 1.51.0, < 1.53.0

1.53.0

Наименование

grpc

rubygems
Затронутые версииВерсия исправления

>= 1.51.0, < 1.53.0

1.53.0

EPSS

Процентиль: 22%
0.00073
Низкий

7.5 High

CVSS3

Дефекты

CWE-617

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

There exists an vulnerability causing an abort() to be called in gRPC. The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.

CVSS3: 7.5
redhat
больше 2 лет назад

There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.

CVSS3: 7.5
nvd
больше 2 лет назад

There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.

CVSS3: 7.5
debian
больше 2 лет назад

There exists an vulnerability causing an abort() to be called in gRPC. ...

CVSS3: 7.5
fstec
больше 2 лет назад

Уязвимость системы удалённого вызова процедур Google gRPC, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 22%
0.00073
Низкий

7.5 High

CVSS3

Дефекты

CWE-617