Lucene search

K
rubygemsRubySecRUBY:GOOGLE-PROTOBUF-2021-22569
HistoryJan 06, 2022 - 9:00 p.m.

A potential Denial of Service issue in protobuf-java

2022-01-0621:00:00
RubySec
github.com
15
denial of service
protobuf-java
java
parsing weakness
high severity
malicious payload
gc pauses
oss-fuzz issue
mitigation
update
protobuf-kotlin
google-protobuf
jruby

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

42.3%

Summary

A potential Denial of Service issue in protobuf-java was discovered in the
parsing procedure for binary data.

Affected versions: All versions of Java Protobufs (including Kotlin and JRuby)
prior to the versions listed below. Protobuf “javalite” users (typically
Android) are not affected.

Severity

High - An implementation weakness in how unknown fields are parsed in
Java. A small (~800 KB) malicious payload can occupy the parser for several
minutes by creating large numbers of short-lived objects that cause frequent,
repeated GC pauses.

Proof of Concept

For reproduction details, please refer to the oss-fuzz issue that identifies
the specific inputs that exercise this parsing weakness.

Remediation and Mitigation

Please update to the latest available versions of the following packages:

  • protobuf-java (3.16.1, 3.18.2, 3.19.2)
  • protobuf-kotlin (3.18.2, 3.19.2)
  • google-protobuf [JRuby gem only] (3.19.2)

Affected configurations

Vulners
Node
rubygoogle-protobufRange3.19.2
VendorProductVersionCPE
rubygoogle-protobuf*cpe:2.3:a:ruby:google-protobuf:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

42.3%