Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-24777
HistoryMar 25, 2022 - 4:35 p.m.

CVE-2022-24777 Denial of Service via reachable assertion in grpc-swift

2022-03-2516:35:09
CWE-617
GitHub_M
www.cve.org
10
denial of service
reachable assertion
grpc
remote procedure call (rpc)
vulnerable
version 1.7.2

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

37.0%

grpc-swift is the Swift language implementation of gRPC, a remote procedure call (RPC) framework. Prior to version 1.7.2, a grpc-swift server is vulnerable to a denial of service attack via a reachable assertion. This is due to incorrect logic when handling GOAWAY frames. The attack is low-effort: it takes very little resources to construct and send the required sequence of frames. The impact on availability is high as the server will crash, dropping all in flight connections and requests. This issue is fixed in version 1.7.2. There are currently no known workarounds.

CNA Affected

[
  {
    "product": "grpc-swift",
    "vendor": "grpc",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.7.2"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

37.0%

Related for CVELIST:CVE-2022-24777