Lucene search

K
nvd6b35d637-e00f-4228-858c-b20ad6e1d07bNVD:CVE-2023-6245
HistoryDec 08, 2023 - 3:15 p.m.

CVE-2023-6245

2023-12-0815:15:08
CWE-20
CWE-835
CWE-1288
CWE-168
6b35d637-e00f-4228-858c-b20ad6e1d07b
web.nvd.nist.gov
5
candid library
dos
payload parsing
infinite decoding
performance degradation
rust
canister traps

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

49.6%

The Candid library causes a Denial of Service while
parsing a specially crafted payload with ‘empty’ data type. For example,
if the payload is record { * ; empty } and the canister interface expects record { * } then the Rust candid decoder treats empty as an extra field required by the type. The problem with the type empty is that the candid Rust library wrongly categorizes empty as a recoverable error when skipping the field and thus causing an infinite decoding loop.

Canisters using affected versions of candid
are exposed to denial of service by causing the decoding to run
indefinitely until the canister traps due to reaching maximum
instruction limit per execution round. Repeated exposure to the payload
will result in degraded performance of the canister. Note: Canisters written in Motoko are unaffected.

Affected configurations

NVD
Node
dfinitycandidRange0.9.00.9.10rust

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

49.6%

Related for NVD:CVE-2023-6245