Description
The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.
Related CPE's
a
oracle
banking_apis
a
oracle
banking_digital_experience
a
oracle
communications_brm_-_elastic_charging_engine
a
oracle
peoplesoft_enterprise_peopletools
a
oracle
webcenter_portal
o
debian
debian_linux
References
https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363
https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html
https://security.netapp.com/advisory/ntap-20220210-0012/
https://www.debian.org/security/2023/dsa-5316
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Modified
Published
2021-10-19T15:15:07.757
3 years agoLast modified
2023-11-07T03:36:54.510
1 year ago