• 公告ID (KylinSec-SA-2024-3878)

摘要:

Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.

安全等级: Low

公告ID: KylinSec-SA-2024-3878

发布日期: 2024年10月8日

关联CVE: CVE-2024-7254  

  • 详细介绍

1. 漏洞描述

   

Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-7254 KY3.4-5A grpc Unaffected
CVE-2024-7254 KY3.5.2 grpc Unaffected
CVE-2024-7254 V6 grpc Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-3847 下一篇:KylinSec-SA-2024-3879