Lucene search

K
redosRedosROS-20221020-02
HistoryOct 20, 2022 - 12:00 a.m.

ROS-20221020-02

2022-10-2000:00:00
redos.red-soft.ru
14
java
protocol buffers
vulnerability
binary data
exploitation
remote attacker
input data
non-repeating embedded messages
repetitive fields
unknown fields
garbage collection

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

32.6%

A vulnerability in the Java Protocol Buffers protobuf-java runtime library is related to a problem analyzing
binary data. Exploitation of the vulnerability could allow an attacker acting remotely to send data containing multiple instances of non-repeating embedded messages to the application’s
application input data containing multiple instances of non-repeating embedded messages with either repetitive or unknown fields.
repetitive or unknown fields, causing objects to be transformed several
multiple times, resulting in potentially lengthy pauses in garbage collection.

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64protobuf<= 3.6.1-4UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

32.6%