Логотип exploitDog
bind:CVE-2025-3857
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-3857

Количество 2

Количество 2

nvd логотип

CVE-2025-3857

10 месяцев назад

When reading binary Ion data through Amazon.IonDotnet using the RawBinaryReader class, Amazon.IonDotnet does not check the number of bytes read from the underlying stream while deserializing the binary format. If the Ion data is malformed or truncated, this triggers an infinite loop condition that could potentially result in a denial of service. Users should upgrade to Amazon.IonDotnet version 1.3.1 and ensure any forked or derivative code is patched to incorporate the new fixes.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-gm2p-wf5c-w3pj

10 месяцев назад

Infinite loop condition in Amazon.IonDotnet

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-3857

When reading binary Ion data through Amazon.IonDotnet using the RawBinaryReader class, Amazon.IonDotnet does not check the number of bytes read from the underlying stream while deserializing the binary format. If the Ion data is malformed or truncated, this triggers an infinite loop condition that could potentially result in a denial of service. Users should upgrade to Amazon.IonDotnet version 1.3.1 and ensure any forked or derivative code is patched to incorporate the new fixes.

CVSS3: 7.5
0%
Низкий
10 месяцев назад
github логотип
GHSA-gm2p-wf5c-w3pj

Infinite loop condition in Amazon.IonDotnet

CVSS3: 7.5
0%
Низкий
10 месяцев назад

Уязвимостей на страницу