Skip to main content

Allocation of Resources Without Limits or Throttling

CVE-2023-43642

Severity High
Score 7.5/10

Summary

snappy-java is a Java port of the snappy, a fast C++ compresser/decompresser developed by Google. The "SnappyInputStream" was found to be vulnerable to Denial of Service (DoS) attacks when decompressing data with a too large chunk size. Due to missing upper bound check on chunk length, an unrecoverable fatal error can occur. This issue affects org.xerial.snappy:snappy-java versions 1.1.10.1 through 1.1.10.3. Users are advised to upgrade. Users unable to upgrade should only accept compressed data from trusted sources.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • NONE
  • HIGH

CWE-770 - Allocation of Resources Without Limits or Throttling

The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.

Advisory Timeline

  • Published