7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.059 Low
EPSS
Percentile
93.4%
Severity: Medium
Date : 2021-02-27
CVE-ID : CVE-2020-13949
Package : thrift
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-1568
The package thrift before version 0.14.0-1 is vulnerable to denial of
service.
Upgrade to 0.14.0-1.
The problem has been fixed upstream in version 0.14.0.
None.
Applications using Thrift before version 0.14.0 would not error upon
receiving messages declaring containers of sizes larger than the
payload. As a result, malicious RPC clients could send short messages
which would result in a large memory allocation, potentially leading to
denial of service.
Malicious clients could send crafted messages crashing the server.
https://www.openwall.com/lists/oss-security/2021/02/11/2
https://security.archlinux.org/CVE-2020-13949
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.059 Low
EPSS
Percentile
93.4%