Lucene search

K
cveGitHub_MCVE-2024-36129
HistoryJun 05, 2024 - 6:15 p.m.

CVE-2024-36129

2024-06-0518:15:10
CWE-119
GitHub_M
web.nvd.nist.gov
38
opentelemetry collector
vendor-agnostic
telemetry data
vulnerability
memory consumption
unauthenticated
crash
version 0.102.1
confighttp
configgrpc
nvd

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

AI Score

8.1

Confidence

High

EPSS

0.001

Percentile

26.3%

The OpenTelemetry Collector offers a vendor-agnostic implementation on how to receive, process and export telemetry data. An unsafe decompression vulnerability allows unauthenticated attackers to crash the collector via excessive memory consumption. OTel Collector version 0.102.1 fixes this issue. It is also fixed in the confighttp module version 0.102.0 and configgrpc module version 0.102.1.

Affected configurations

Nvd
Vulners
Vulnrichment
Node
opentelemetryconfiggrpcRange<0.102.1go
OR
opentelemetryconfighttpRange<0.102.0go
OR
opentelemetryopentelemetry_collectorRange<0.102.1
VendorProductVersionCPE
opentelemetryconfiggrpc*cpe:2.3:a:opentelemetry:configgrpc:*:*:*:*:*:go:*:*
opentelemetryconfighttp*cpe:2.3:a:opentelemetry:confighttp:*:*:*:*:*:go:*:*
opentelemetryopentelemetry_collector*cpe:2.3:a:opentelemetry:opentelemetry_collector:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "open-telemetry",
    "product": "opentelemetry-collector",
    "versions": [
      {
        "version": "< 0.102.1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

AI Score

8.1

Confidence

High

EPSS

0.001

Percentile

26.3%