Lucene search

K
nvd[email protected]NVD:CVE-2022-1941
HistorySep 22, 2022 - 3:15 p.m.

CVE-2022-1941

2022-09-2215:15:09
CWE-1286
web.nvd.nist.gov
parsing
vulnerability
protocolbuffers
out of memory
denial of service
unsanitized input
upgrade

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

59.1%

A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated.

Affected configurations

NVD
Node
googleprotobuf-cppRange<3.18.3
OR
googleprotobuf-cppRange3.19.03.19.5
OR
googleprotobuf-cppRange3.20.03.20.2
OR
googleprotobuf-cppRange3.21.03.21.6
OR
googleprotobuf-pythonRange<3.18.3
OR
googleprotobuf-pythonRange3.19.03.19.5
OR
googleprotobuf-pythonRange3.20.03.20.2
OR
googleprotobuf-pythonRange4.0.04.21.6
Node
fedoraprojectfedoraMatch36
OR
fedoraprojectfedoraMatch37
Node
debiandebian_linuxMatch10.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

59.1%