Vulnerabilites related to Google - protobuf-kotlin
cve-2022-3171
Vulnerability from cvelistv5
Published
2022-10-12 00:00
Modified
2024-08-03 01:00
Summary
A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.
Impacted products
Vendor Product Version
Google LLC Protocolbuffers Version: 3.21.7   < 3.21.7
Version: 3.20.3   < 3.20.3
Version: 3.19.6   < 3.19.6
Version: 3.16.3   < 3.16.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:00:10.773Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2",
               },
               {
                  name: "FEDORA-2022-25f35ed634",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBAUKJQL6O4TIWYBENORSY5P43TVB4M3/",
               },
               {
                  name: "GLSA-202301-09",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202301-09",
               },
               {
                  name: "FEDORA-2022-15729fa33d",
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "core and lite",
               ],
               product: "Protocolbuffers",
               vendor: "Google LLC",
               versions: [
                  {
                     lessThan: "3.21.7",
                     status: "affected",
                     version: "3.21.7",
                     versionType: "custom",
                  },
                  {
                     lessThan: "3.20.3",
                     status: "affected",
                     version: "3.20.3",
                     versionType: "custom",
                  },
                  {
                     lessThan: "3.19.6",
                     status: "affected",
                     version: "3.19.6",
                     versionType: "custom",
                  },
                  {
                     lessThan: "3.16.3",
                     status: "affected",
                     version: "3.16.3",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "ADJACENT_NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20 Improper Input Validation",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-27T00:00:00",
            orgId: "14ed7db2-1595-443d-9d34-6215bf890778",
            shortName: "Google",
         },
         references: [
            {
               url: "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2",
            },
            {
               name: "FEDORA-2022-25f35ed634",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBAUKJQL6O4TIWYBENORSY5P43TVB4M3/",
            },
            {
               name: "GLSA-202301-09",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://security.gentoo.org/glsa/202301-09",
            },
            {
               name: "FEDORA-2022-15729fa33d",
               tags: [
                  "vendor-advisory",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP/",
            },
         ],
         source: {
            discovery: "INTERNAL",
         },
         title: "Memory handling vulnerability in ProtocolBuffers Java core and lite",
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "14ed7db2-1595-443d-9d34-6215bf890778",
      assignerShortName: "Google",
      cveId: "CVE-2022-3171",
      datePublished: "2022-10-12T00:00:00",
      dateReserved: "2022-09-09T00:00:00",
      dateUpdated: "2024-08-03T01:00:10.773Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-7254
Vulnerability from cvelistv5
Published
2024-09-19 00:18
Modified
2024-12-13 13:09
Summary
Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
Impacted products
Vendor Product Version
Google Protocol Buffers Version: 0   < 28.2
Create a notification for this product.
   Google protobuf-java Version: 0   < 3.25.5
Version: 0   < 4.27.5
Version: 0   < 4.28.2
Create a notification for this product.
   Google protobuf-javalite Version: 0   < 3.25.5
Version: 0   < 4.27.5
Version: 0   < 4.28.2
Create a notification for this product.
   Google protobuf-kotlin Version: 0   < 3.25.5
Version: 0   < 4.27.5
Version: 0   < 4.28.2
Create a notification for this product.
   Google protobuf-kotllin-lite Version: 0   < 3.25.5
Version: 0   < 4.27.5
Version: 0   < 4.28.2
Create a notification for this product.
   Google google-protobuf [JRuby Gem] Version: 0   < 3.25.5
Version: 0   < 4.27.5
Version: 0   < 4.28.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:google:protobuf:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unaffected",
                  product: "protobuf",
                  vendor: "google",
                  versions: [
                     {
                        lessThan: "28.2",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:*",
                     "cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*",
                     "cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:*",
                     "cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:*",
                     "cpe:2.3:a:google:protobuf-kotlin-lite:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unaffected",
                  product: "protobuf-kotlin-lite",
                  vendor: "google",
                  versions: [
                     {
                        lessThan: "3.25.5",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.27.5",
                        status: "affected",
                        version: "4.27",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.28.2",
                        status: "affected",
                        version: "4.28",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-7254",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-19T14:29:43.468555Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-19T14:46:14.517Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-12-13T13:09:27.312Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  url: "https://security.netapp.com/advisory/ntap-20241213-0010/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Protocol Buffers",
               repo: "https://github.com/protocolbuffers/protobuf",
               vendor: "Google",
               versions: [
                  {
                     lessThan: "28.2",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               collectionURL: "https://mvnrepository.com/artifact/com.google.protobuf/protobuf-java",
               defaultStatus: "unaffected",
               product: "protobuf-java",
               vendor: "Google",
               versions: [
                  {
                     lessThan: "3.25.5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.27.5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.28.2",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "protobuf-javalite",
               vendor: "Google",
               versions: [
                  {
                     lessThan: "3.25.5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.27.5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.28.2",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "protobuf-kotlin",
               vendor: "Google",
               versions: [
                  {
                     lessThan: "3.25.5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.27.5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.28.2",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "protobuf-kotllin-lite",
               vendor: "Google",
               versions: [
                  {
                     lessThan: "3.25.5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.27.5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.28.2",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               collectionURL: "https://rubygems.org/gems/google-protobuf",
               defaultStatus: "unaffected",
               product: "google-protobuf [JRuby Gem]",
               vendor: "Google",
               versions: [
                  {
                     lessThan: "3.25.5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.27.5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.28.2",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               type: "finder",
               value: "Alexis Challande, Trail of Bits Ecosystem Security Team <ecosystem@trailofbits.com>",
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p><span style=\"background-color: rgb(255, 255, 255);\">Any project that parses untrusted Protocol Buffers data</span><span style=\"background-color: rgb(255, 255, 255);\"><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;containing an arbitrary number of nested </span><code>group</code><span style=\"background-color: rgb(255, 255, 255);\">s / series of </span><code>SGROUP</code><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;tags can corrupted by exceeding the stack limit i.e. StackOverflow. </span><span style=\"background-color: transparent;\">Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.</span></span><br></p>",
                  },
               ],
               value: "Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.",
            },
         ],
         impacts: [
            {
               capecId: "CAPEC-100",
               descriptions: [
                  {
                     lang: "en",
                     value: "CAPEC-100 Overflow Buffers",
                  },
               ],
            },
         ],
         metrics: [
            {
               cvssV4_0: {
                  Automatable: "NOT_DEFINED",
                  Recovery: "NOT_DEFINED",
                  Safety: "NOT_DEFINED",
                  attackComplexity: "LOW",
                  attackRequirements: "NONE",
                  attackVector: "NETWORK",
                  baseScore: 8.7,
                  baseSeverity: "HIGH",
                  privilegesRequired: "NONE",
                  providerUrgency: "NOT_DEFINED",
                  subAvailabilityImpact: "NONE",
                  subConfidentialityImpact: "NONE",
                  subIntegrityImpact: "NONE",
                  userInteraction: "NONE",
                  valueDensity: "NOT_DEFINED",
                  vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                  version: "4.0",
                  vulnAvailabilityImpact: "HIGH",
                  vulnConfidentialityImpact: "NONE",
                  vulnIntegrityImpact: "NONE",
                  vulnerabilityResponseEffort: "NOT_DEFINED",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20 Improper Input Validation",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-09-19T00:18:45.824Z",
            orgId: "14ed7db2-1595-443d-9d34-6215bf890778",
            shortName: "Google",
         },
         references: [
            {
               url: "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Stack overflow in Protocol Buffers Java Lite",
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "14ed7db2-1595-443d-9d34-6215bf890778",
      assignerShortName: "Google",
      cveId: "CVE-2024-7254",
      datePublished: "2024-09-19T00:18:45.824Z",
      dateReserved: "2024-07-29T21:41:56.116Z",
      dateUpdated: "2024-12-13T13:09:27.312Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-22569
Vulnerability from cvelistv5
Published
2022-01-07 00:00
Modified
2024-08-03 18:44
Summary
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
Impacted products
Vendor Product Version
Google LLC protobuf-java Version: unspecified   < 3.16.1
Version: unspecified   < 3.18.2
Version: unspecified   < 3.19.2
Create a notification for this product.
   Google LLC protobuf-kotlin Version: unspecified   < 3.18.2
Version: unspecified   < 3.19.2
Create a notification for this product.
   Google LLC google-protobuf [JRuby Gem] Version: unspecified   < 3.19.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:44:14.144Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cloud.google.com/support/bulletins#gcp-2022-001",
               },
               {
                  name: "[oss-security] 20220112 CVE-2021-22569: Protobuf Java, Kotlin, JRuby DoS",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2022/01/12/4",
               },
               {
                  name: "[oss-security] 20220112 Re: CVE-2021-22569: Protobuf Java, Kotlin, JRuby DoS",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2022/01/12/7",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
               },
               {
                  name: "[debian-lts-announce] 20230418 [SECURITY] [DLA 3393-1] protobuf security update",
                  tags: [
                     "mailing-list",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "protobuf-java",
               vendor: "Google LLC",
               versions: [
                  {
                     lessThan: "3.16.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "3.18.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "3.19.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "protobuf-kotlin",
               vendor: "Google LLC",
               versions: [
                  {
                     lessThan: "3.18.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "3.19.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "google-protobuf [JRuby Gem]",
               vendor: "Google LLC",
               versions: [
                  {
                     lessThan: "3.19.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "OSS-Fuzz - https://github.com/google/oss-fuzz",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-696",
                     description: "CWE-696 Incorrect Behavior Order",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-18T00:00:00",
            orgId: "14ed7db2-1595-443d-9d34-6215bf890778",
            shortName: "Google",
         },
         references: [
            {
               url: "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330",
            },
            {
               url: "https://cloud.google.com/support/bulletins#gcp-2022-001",
            },
            {
               name: "[oss-security] 20220112 CVE-2021-22569: Protobuf Java, Kotlin, JRuby DoS",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2022/01/12/4",
            },
            {
               name: "[oss-security] 20220112 Re: CVE-2021-22569: Protobuf Java, Kotlin, JRuby DoS",
               tags: [
                  "mailing-list",
               ],
               url: "http://www.openwall.com/lists/oss-security/2022/01/12/7",
            },
            {
               url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
            },
            {
               name: "[debian-lts-announce] 20230418 [SECURITY] [DLA 3393-1] protobuf security update",
               tags: [
                  "mailing-list",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html",
            },
         ],
         source: {
            discovery: "INTERNAL",
         },
         title: "Denial of Service of protobuf-java parsing procedure",
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "14ed7db2-1595-443d-9d34-6215bf890778",
      assignerShortName: "Google",
      cveId: "CVE-2021-22569",
      datePublished: "2022-01-07T00:00:00",
      dateReserved: "2021-01-05T00:00:00",
      dateUpdated: "2024-08-03T18:44:14.144Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2022-10-12 23:15
Modified
2024-11-21 07:18
Summary
A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:*",
                     matchCriteriaId: "1097AC30-B07F-4759-B62E-86B7856DB9BF",
                     versionEndExcluding: "3.16.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:*",
                     matchCriteriaId: "F9A3FACD-AB55-41D7-86E2-A49E55C901E9",
                     versionEndExcluding: "3.19.6",
                     versionStartIncluding: "3.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:*",
                     matchCriteriaId: "C92E0E73-782B-4ABB-A1C9-FB762744E1E8",
                     versionEndExcluding: "3.20.3",
                     versionStartIncluding: "3.20.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:*",
                     matchCriteriaId: "83C75530-D5AE-4AD9-A548-E4AD87300982",
                     versionEndExcluding: "3.21.7",
                     versionStartIncluding: "3.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC11741F-5A8A-4EBA-B4F8-046866813A97",
                     versionEndExcluding: "3.16.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E669203D-A2DE-4148-A966-81843737603C",
                     versionEndExcluding: "3.19.6",
                     versionStartIncluding: "3.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "56CA1E8D-A555-4F4F-80D8-F23D0DC50BB8",
                     versionEndExcluding: "3.20.3",
                     versionStartIncluding: "3.20.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E82CFAC2-2F65-45FD-88D9-D42145FC4A4F",
                     versionEndExcluding: "3.21.7",
                     versionStartIncluding: "3.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "50F55B55-9C50-4489-A1A7-9FD0893FB877",
                     versionEndExcluding: "3.16.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B4050D4-2224-467C-B46D-2CD734B3B0FB",
                     versionEndExcluding: "3.19.6",
                     versionStartIncluding: "3.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "459A8615-D2ED-49F3-A81C-DC4560D96C93",
                     versionEndExcluding: "3.20.3",
                     versionStartIncluding: "3.20.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "712693B9-41AB-41D1-97B2-560FDFEE0863",
                     versionEndExcluding: "3.21.7",
                     versionStartIncluding: "3.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "78B4C867-FA47-464D-85D1-DB46E5F035A6",
                     versionEndExcluding: "3.16.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCCCC941-D98E-4B60-A1E2-282EBFF92B17",
                     versionEndExcluding: "3.19.6",
                     versionStartIncluding: "3.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E923BA-CB98-4B28-9BB5-A8D62E21D086",
                     versionEndExcluding: "3.20.3",
                     versionStartIncluding: "3.20.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "81C71355-5BBB-4197-A5A6-EFDF750C4C90",
                     versionEndExcluding: "3.21.7",
                     versionStartIncluding: "3.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-kotlin-lite:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F758471D-1586-4A85-A567-85321F7B186F",
                     versionEndExcluding: "3.16.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-kotlin-lite:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAA9ACA3-A94B-473B-9393-51C32473954F",
                     versionEndExcluding: "3.19.6",
                     versionStartIncluding: "3.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-kotlin-lite:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EE1D9B6-30FC-4AB9-921B-A4A8F4E41387",
                     versionEndExcluding: "3.20.3",
                     versionStartIncluding: "3.20.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-kotlin-lite:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9839B552-5DAF-4892-B34D-69201B0258A2",
                     versionEndExcluding: "3.21.7",
                     versionStartIncluding: "3.21.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                     matchCriteriaId: "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.",
      },
      {
         lang: "es",
         value: "Un problema de análisis de datos binarios en protobuf-java core y lite versiones anteriores a 3.21.7, 3.20.3, 3.19.6 y 3.16.3, puede conllevar a un ataque de denegación de servicio. Las entradas que contienen múltiples instancias de mensajes insertados no repetidos con campos repetidos o desconocidos causan que los objetos sean convertidos de ida y vuelta entre las formas mutables e inmutables, resultando en pausas de recolección de basura potencialmente largas. Es recomendado actualizar a versiones mencionadas anteriormente",
      },
   ],
   id: "CVE-2022-3171",
   lastModified: "2024-11-21T07:18:58.277",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "LOW",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "cve-coordination@google.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-10-12T23:15:09.807",
   references: [
      {
         source: "cve-coordination@google.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2",
      },
      {
         source: "cve-coordination@google.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBAUKJQL6O4TIWYBENORSY5P43TVB4M3/",
      },
      {
         source: "cve-coordination@google.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP/",
      },
      {
         source: "cve-coordination@google.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202301-09",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBAUKJQL6O4TIWYBENORSY5P43TVB4M3/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202301-09",
      },
   ],
   sourceIdentifier: "cve-coordination@google.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "cve-coordination@google.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-01-10 14:10
Modified
2024-11-21 05:50
Summary
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:*",
                     matchCriteriaId: "01422CF6-13DE-42DF-A6FF-67E70D40DE6E",
                     versionEndExcluding: "3.19.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CAAA7EA-1EE1-433E-939A-B25BDE08FF22",
                     versionEndExcluding: "3.16.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBBE87EA-F13D-4A0A-AF42-A361AB4F6611",
                     versionEndExcluding: "3.18.2",
                     versionStartIncluding: "3.18.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5707A6F9-0CEC-4CAA-B860-EBFA2D525B64",
                     versionEndExcluding: "3.19.2",
                     versionStartIncluding: "3.19.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A252BD12-1555-4E89-B671-D459D3F149E0",
                     versionEndExcluding: "3.18.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "329F610C-F8CB-4009-B3A2-D0CB7FDDCB28",
                     versionEndExcluding: "3.19.2",
                     versionStartIncluding: "3.19.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAAB7154-4DE8-4806-86D0-C1D33B84417B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F60E32F-0CA0-4C2D-9848-CB92765A9ACB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF616620-88CE-4A77-B904-C1728A2E6F9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4367D9B-BF81-47AD-A840-AC46317C774D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:19c:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5291552-F823-48E6-B9D8-E94740C4CEFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:21c:*:*:*:*:*:*:*",
                     matchCriteriaId: "051613BE-6E8E-4865-8DA5-24352E9B9AD0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.",
      },
      {
         lang: "es",
         value: "Un problema en protobuf-java permitía intercalar campos com.google.protobuf.UnknownFieldSet de tal manera que eran procesados fuera de orden. Una pequeña carga útil maliciosa puede ocupar el analizador durante varios minutos al crear un gran número de objetos de corta duración que causan frecuentes y repetidas pausas. Recomendamos actualizar las bibliotecas más allá de las versiones vulnerables",
      },
   ],
   id: "CVE-2021-22569",
   lastModified: "2024-11-21T05:50:20.647",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "cve-coordination@google.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-01-10T14:10:16.747",
   references: [
      {
         source: "cve-coordination@google.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2022/01/12/4",
      },
      {
         source: "cve-coordination@google.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2022/01/12/7",
      },
      {
         source: "cve-coordination@google.com",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330",
      },
      {
         source: "cve-coordination@google.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cloud.google.com/support/bulletins#gcp-2022-001",
      },
      {
         source: "cve-coordination@google.com",
         url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html",
      },
      {
         source: "cve-coordination@google.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2022/01/12/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2022/01/12/7",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Mailing List",
            "Vendor Advisory",
         ],
         url: "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cloud.google.com/support/bulletins#gcp-2022-001",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
      },
   ],
   sourceIdentifier: "cve-coordination@google.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-696",
            },
         ],
         source: "cve-coordination@google.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}