Lucene search

K
cve[email protected]CVE-2022-3510
HistoryDec 12, 2022 - 1:15 p.m.

CVE-2022-3510

2022-12-1213:15:14
web.nvd.nist.gov
161
cve-2022-3510
parsing issue
protobuf-java
denial of service
cve-2022-3171
message-type extensions
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.6%

A parsing issue similar to CVE-2022-3171, but with Message-Type Extensions in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.

Affected configurations

Vulners
NVD
Node
googlegoogle_appsRange3.21.03.21.7
OR
googlegoogle_appsRange3.20.03.20.3
OR
googlegoogle_appsRange3.19.03.19.6
OR
googlegoogle_appsRange3.16.03.16.3
VendorProductVersionCPE
googlegoogle_apps*cpe:2.3:a:google:google_apps:*:*:*:*:*:*:*:*
googlegoogle_apps*cpe:2.3:a:google:google_apps:*:*:*:*:*:*:*:*
googlegoogle_apps*cpe:2.3:a:google:google_apps:*:*:*:*:*:*:*:*
googlegoogle_apps*cpe:2.3:a:google:google_apps:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "all"
    ],
    "product": "ProtocolBuffers",
    "repo": "https://github.com/protocolbuffers/protobuf/",
    "vendor": "Google",
    "versions": [
      {
        "lessThan": "3.21.7",
        "status": "affected",
        "version": "3.21.0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.20.3",
        "status": "affected",
        "version": "3.20.0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.19.6",
        "status": "affected",
        "version": "3.19.0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.16.3",
        "status": "affected",
        "version": "3.16.0",
        "versionType": "semver"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.6%