Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2424 | snappy-java is a Java port of the snappy, a fast C++ compresser/decompresser developed by Google. The SnappyInputStream was found to be vulnerable to Denial of Service (DoS) attacks when decompressing data with a too large chunk size. Due to missing upper bound check on chunk length, an unrecoverable fatal error can occur. All versions of snappy-java including the latest released version 1.1.10.3 are vulnerable to this issue. A fix has been introduced in commit `9f8c3cf74` which will be included in the 1.1.10.4 release. Users are advised to upgrade. Users unable to upgrade should only accept compressed data from trusted sources. |
Github GHSA |
GHSA-55g7-9cwv-5qfv | snappy-java's missing upper bound check on chunk length can lead to Denial of Service (DoS) impact |
Tue, 24 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-24T15:26:53.851Z
Reserved: 2023-09-20T15:35:38.146Z
Link: CVE-2023-43642
Updated: 2024-08-02T19:44:43.818Z
Status : Modified
Published: 2023-09-25T20:15:11.723
Modified: 2024-11-21T08:24:31.663
Link: CVE-2023-43642
OpenCVE Enrichment
No data.
EUVD
Github GHSA