GHSA-8WH2-6QHJ-H7J9
Vulnerability from github – Published: 2024-06-04 17:38 – Updated: 2024-06-04 17:38Summary
iq80 Snappy performs out-of-bounds read access when uncompressing certain data, which can lead to a JVM crash.
Details
When uncompressing certain data, Snappy tries to read outside the bounds of the given byte arrays. Because Snappy uses the JDK class sun.misc.Unsafe to speed up memory access, no additional bounds checks are performed and this has similar security consequences as out-of-bounds access in C or C++, namely it can lead to non-deterministic behavior or crash the JVM.
iq80 Snappy is not actively maintained anymore. As quick fix users can upgrade to version 0.5, but in the long term users should prefer migrating to the Snappy implementation in https://github.com/airlift/aircompressor (version 0.27 or newer).
Impact
When uncompressing data from untrusted users, this can be exploited for a denial-of-service attack by crashing the JVM.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.iq80.snappy:snappy"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-36124"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": true,
"github_reviewed_at": "2024-06-04T17:38:31Z",
"nvd_published_at": "2024-06-03T15:15:09Z",
"severity": "MODERATE"
},
"details": "### Summary\niq80 Snappy performs out-of-bounds read access when uncompressing certain data, which can lead to a JVM crash.\n\n### Details\nWhen uncompressing certain data, Snappy tries to read outside the bounds of the given byte arrays. Because Snappy uses the JDK class `sun.misc.Unsafe` to speed up memory access, no additional bounds checks are performed and this has similar security consequences as out-of-bounds access in C or C++, namely it can lead to non-deterministic behavior or crash the JVM.\n\niq80 Snappy is not actively maintained anymore. As quick fix users can upgrade to version 0.5, but in the long term users should prefer migrating to the Snappy implementation in https://github.com/airlift/aircompressor (version 0.27 or newer).\n\n### Impact\nWhen uncompressing data from untrusted users, this can be exploited for a denial-of-service attack by crashing the JVM.\n",
"id": "GHSA-8wh2-6qhj-h7j9",
"modified": "2024-06-04T17:38:31Z",
"published": "2024-06-04T17:38:31Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/dain/snappy/security/advisories/GHSA-8wh2-6qhj-h7j9"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36124"
},
{
"type": "PACKAGE",
"url": "https://github.com/dain/snappy"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
],
"summary": "iq80 Snappy out-of-bounds read when uncompressing data, leading to JVM crash"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.