Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-7254

Опубликовано: 19 сент. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.

A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.

Отчет

This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as DiscardUnknownFieldsParser or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack's capacity, causing the application to crash or become unresponsive. The protobuf package as shipped in RHEL does not include the affected java or kotlin bindings, therefore RHEL is Not Affected.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2com.google.protobuf/protobuf-javaUnder investigation
Cryostat 3com.google.protobuf/protobuf-javaUnder investigation
Logging Subsystem for Red Hat OpenShiftcom.google.protobuf/protobuf-javaUnder investigation
Red Hat AMQ Broker 7com.google.protobuf/protobuf-javaUnder investigation
Red Hat build of Apicurio Registry 2com.google.protobuf/protobuf-javaUnder investigation
Red Hat build of Debezium 2com.google.protobuf/protobuf-javaUnder investigation
Red Hat build of OptaPlanner 8com.google.protobuf/protobuf-javaUnder investigation
Red Hat Data Grid 8com.google.protobuf/protobuf-javaUnder investigation
Red Hat Enterprise Linux 10mysql8.4Not affected
Red Hat Enterprise Linux 10protobufNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2313454protobuf: StackOverflow vulnerability in Protocol Buffers

EPSS

Процентиль: 41%
0.00189
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
12 месяцев назад

Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.

CVSS3: 7.5
nvd
12 месяцев назад

Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.

CVSS3: 7.5
debian
12 месяцев назад

Any project that parses untrusted Protocol Buffers datacontaining an a ...

suse-cvrf
11 месяцев назад

Security update for protobuf

suse-cvrf
11 месяцев назад

Security update for protobuf

EPSS

Процентиль: 41%
0.00189
Низкий

7.5 High

CVSS3