Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-34455
HistoryJun 15, 2023 - 12:00 a.m.

CVE-2023-34455

2023-06-1500:00:00
ubuntu.com
ubuntu.com
173
snappy-java
unchecked chunk length
fatal error
unrecoverable error
outofmemoryerror
java
security vulnerability
patch
filesnappyinputstream.java
compression/decompression

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

39.5%

snappy-java is a fast compressor/decompressor for Java. Due to use of an
unchecked chunk length, an unrecoverable fatal error can occur in versions
prior to 1.1.10.1. The code in the function hasNextChunk in the
fileSnappyInputStream.java checks if a given stream has more chunks to
read. It does that by attempting to read 4 bytes. If it wasnโ€™t possible to
read the 4 bytes, the function returns false. Otherwise, if 4 bytes were
available, the code treats them as the length of the next chunk. In the
case that the compressed variable is null, a byte array is allocated with
the size given by the input data. Since the code doesnโ€™t test the legality
of the chunkSize variable, it is possible to pass a negative number (such
as 0xFFFFFFFF which is -1), which will cause the code to raise a
java.lang.NegativeArraySizeException exception. A worse case would happen
when passing a huge positive value (such as 0x7FFFFFFF), which would raise
the fatal java.lang.OutOfMemoryError error. Version 1.1.10.1 contains a
patch for this issue.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

39.5%