Описание
Brotli Library Buffer Overflow Vulnerability
FAQ
Why is this Google LLC CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in the Brotli library which is consumed by .NET and by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of .NET and Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.
Обновления
Продукт | Статья | Обновление |
---|---|---|
.NET Core 3.1 | ||
PowerShell 7.0 | ||
.NET 5.0 | ||
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) | ||
Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8) | ||
PowerShell 7.1 | ||
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
Microsoft Visual Studio 2022 version 17.0 | ||
PowerShell 7.2 | ||
Microsoft Visual Studio 2022 version 17.1 |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
DOS
EPSS
6.5 Medium
CVSS3
Связанные уязвимости
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
A buffer overflow exists in the Brotli library versions prior to 1.0.8 ...
EPSS
6.5 Medium
CVSS3