Allocation of Resources Without Limits or Throttling
CVE-2023-43642
Summary
snappy-java is a Java port of the snappy, a fast C++ compresser/decompresser developed by Google. The "SnappyInputStream" was found to be vulnerable to Denial of Service (DoS) attacks when decompressing data with a too large chunk size. Due to missing upper bound check on chunk length, an unrecoverable fatal error can occur. This issue affects org.xerial.snappy:snappy-java versions 1.1.10.1 through 1.1.10.3. Users are advised to upgrade. Users unable to upgrade should only accept compressed data from trusted sources.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- NONE
- HIGH
CWE-770 - Allocation of Resources Without Limits or Throttling
The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
References
Advisory Timeline
- Published