Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-37137

Опубликовано: 09 сент. 2021
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.

A flaw was found in the Netty's netty-codec due to unrestricted chunk lengths in the SnappyFrameDecoder. By sending a specially-crafted input, a remote attacker could cause excessive memory usage resulting in a denial of service.

Отчет

In OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of netty-codec package. Since the release of OCP 4.6, the Metering product has been deprecated [1], hence the affected components are marked as wontfix. This may be fixed in the future. Starting in OCP 4.7, the elasticsearch component is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as Out of support scope because these versions are already under Maintenance Phase of the support. [1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2netty-codecAffected
Red Hat BPM Suite 6netty-codecOut of support scope
Red Hat build of Quarkusnetty-codecAffected
Red Hat Integration Camel K 1netty-codecAffected
Red Hat Integration Service Registrynetty-codecNot affected
Red Hat JBoss BRMS 6netty-codecOut of support scope
Red Hat JBoss Data Grid 7netty-codecOut of support scope
Red Hat JBoss Data Virtualization 6netty-codecOut of support scope
Red Hat JBoss Fuse 6netty-codecOut of support scope
Red Hat JBoss Fuse Service Works 6netty-codecOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2004135netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way

EPSS

Процентиль: 85%
0.02383
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.

CVSS3: 7.5
nvd
больше 4 лет назад

The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.

CVSS3: 7.5
debian
больше 4 лет назад

The Snappy frame decoder function doesn't restrict the chunk length wh ...

CVSS3: 7.5
github
больше 4 лет назад

SnappyFrameDecoder doesn't restrict chunk length any may buffer skippable chunks in an unnecessary way

CVSS3: 7.5
fstec
больше 4 лет назад

Уязвимость функции декодирования кадров сетевого программного средства Netty, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 85%
0.02383
Низкий

7.5 High

CVSS3