A potential Denial of Service issue in protobuf-java
High severity
GitHub Reviewed
Published
Jan 6, 2022
in
protocolbuffers/protobuf
•
Updated Jan 24, 2023
Description
Reviewed
Jan 7, 2022
Published to the GitHub Advisory Database
Jan 7, 2022
Published by the National Vulnerability Database
Jan 10, 2022
Last updated
Jan 24, 2023
Summary
A potential Denial of Service issue in protobuf-java was discovered in the parsing procedure for binary data.
Reporter: OSS-Fuzz
Affected versions: All versions of Java Protobufs (including Kotlin and JRuby) prior to the versions listed below. Protobuf "javalite" users (typically Android) are not affected.
Severity
CVE-2021-22569 High - CVSS Score: 7.5, An implementation weakness in how unknown fields are parsed in Java. A small (~800 KB) malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated GC pauses.
Proof of Concept
For reproduction details, please refer to the oss-fuzz issue that identifies the specific inputs that exercise this parsing weakness.
Remediation and Mitigation
Please update to the latest available versions of the following packages:
References