Lucene search

K
cve[email protected]CVE-2022-3171
HistoryOct 12, 2022 - 11:15 p.m.

CVE-2022-3171

2022-10-1223:15:09
CWE-20
web.nvd.nist.gov
421
7
cve-2022-3171
parsing issue
binary data
protobuf-java
denial of service attack
nvd
security update

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.6%

A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.

Affected configurations

Vulners
NVD
Node
googlegoogle_appsRange3.21.73.21.7
OR
googlegoogle_appsRange3.20.33.20.3
OR
googlegoogle_appsRange3.19.63.19.6
OR
googlegoogle_appsRange3.16.33.16.3
VendorProductVersionCPE
googlegoogle_apps*cpe:2.3:a:google:google_apps:*:*:*:*:*:*:*:*
googlegoogle_apps*cpe:2.3:a:google:google_apps:*:*:*:*:*:*:*:*
googlegoogle_apps*cpe:2.3:a:google:google_apps:*:*:*:*:*:*:*:*
googlegoogle_apps*cpe:2.3:a:google:google_apps:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Google LLC",
    "product": "Protocolbuffers",
    "versions": [
      {
        "version": "3.21.7",
        "status": "affected",
        "lessThan": "3.21.7",
        "versionType": "custom"
      },
      {
        "version": "3.20.3",
        "status": "affected",
        "lessThan": "3.20.3",
        "versionType": "custom"
      },
      {
        "version": "3.19.6",
        "status": "affected",
        "lessThan": "3.19.6",
        "versionType": "custom"
      },
      {
        "version": "3.16.3",
        "status": "affected",
        "lessThan": "3.16.3",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "core and lite"
    ]
  }
]

Social References

More

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.6%