Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-87m9-rv8p-rgmg

Опубликовано: 10 июн. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

go-grpc-compression has a zstd decompression bombing vulnerability

Impact

A malicious user could cause a denial of service (DoS) when using a specially crafted gRPC request. The decompression mechanism for zstd did not respect the limits imposed by gRPC, allowing rapid memory usage increases.

Versions v1.1.4 through to v1.2.2 made use of the Decoder.DecodeAll function in github.com/klauspost/compress/zstd to decompress data provided by the peer. The vulnerability is exploitable only by attackers who can send gRPC payloads to users of github.com/mostynb/go-grpc-compression/zstd or github.com/mostynb/go-grpc-compression/nonclobbering/zstd.

Patches

Version v1.2.3 of github.com/mostynb/go-grpc-compression avoids the issue by not using the Decoder.DecodeAll function in github.com/klauspost/compress/zstd.

All users of github.com/mostynb/go-grpc-compression/zstd or github.com/mostynb/go-grpc-compression/nonclobbering/zstd in the affected versions should update to v1.2.3.

Workarounds

Other compression formats were not affected, users may consider switching from zstd to another format without upgrading to a newer release.

References

This issue was uncovered during a security audit performed by Miroslav Stampar of 7ASecurity, facilitated by OSTIF, for the OpenTelemetry project.

https://opentelemetry.io/blog/2024/cve-2024-36129 https://github.com/open-telemetry/opentelemetry-collector/security/advisories/GHSA-c74f-6mfw-mm4v

Пакеты

Наименование

github.com/mostynb/go-grpc-compression

go
Затронутые версииВерсия исправления

>= 1.1.4, < 1.2.3

1.2.3

7.5 High

CVSS3

Дефекты

CWE-400

7.5 High

CVSS3

Дефекты

CWE-400