CVE-2021-22569
ADVISORY - githubSummary
Summary
A potential Denial of Service issue in protobuf-java was discovered in the parsing procedure for binary data.
Reporter: OSS-Fuzz
Affected versions: All versions of Java Protobufs (including Kotlin and JRuby) prior to the versions listed below. Protobuf "javalite" users (typically Android) are not affected.
Severity
CVE-2021-22569 High - CVSS Score: 7.5, An implementation weakness in how unknown fields are parsed in Java. A small (~800 KB) malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated GC pauses.
Proof of Concept
For reproduction details, please refer to the oss-fuzz issue that identifies the specific inputs that exercise this parsing weakness.
Remediation and Mitigation
Please update to the latest available versions of the following packages:
- protobuf-java (3.16.1, 3.18.2, 3.19.2)
- protobuf-kotlin (3.18.2, 3.19.2)
- google-protobuf [JRuby gem only] (3.19.2)
Common Weakness Enumeration (CWE)
Incorrect Behavior Order
Incorrect Behavior Order
Incorrect Behavior Order
NIST
3.9
CVSS SCORE
7.5highGitHub
3.9
CVSS SCORE
7.5highDebian
-
Ubuntu
1.8
CVSS SCORE
5.5lowRed Hat
1.8
CVSS SCORE
5.5mediumChainguard
CGA-7g86-w24x-hwm7
-
Chainguard
CGA-8j74-3gff-6wq3
-
Chainguard
CGA-gp73-784m-3935
-
Chainguard
CGA-h8j8-9v3w-chjj
-
Photon
CVE-2021-22569
-
CVSS SCORE
5.5mediumintheWild
-
-
minimos
MINI-vm5f-ph9j-w35f
-