CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:N
AI Score
Confidence
High
When parsing unknown fields in the Protobuf Java Lite and Full library,
a maliciously crafted message can cause a StackOverflow error and lead
to a program crash.
Reporter: Alexis Challande, Trail of Bits Ecosystem Security
Team <[email protected]>
Affected versions: This issue affects all versions of both the Java
full and lite Protobuf runtimes, as well as Protobuf for Kotlin and
JRuby, which themselves use the Java Protobuf runtime.
CVE-2024-7254
High CVSS4.0 Score 8.7 (NOTE: there may be a delay in publication)
This is a potential Denial of Service. Parsing nested groups as unknown
fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser,
or against Protobuf map fields, creates unbounded recursions that can
be abused by an attacker.
For reproduction details, please refer to the unit tests (Protobuf Java
LiteTest
and CodedInputStreamTest)
that identify the specific inputs that exercise this parsing weakness.
We have been working diligently to address this issue and have released
a mitigation that is available now. Please update to the latest
available versions of the following packages:
Vendor | Product | Version | CPE |
---|---|---|---|
ruby | google-protobuf | * | cpe:2.3:a:ruby:google-protobuf:*:*:*:*:*:*:*:* |