-
-
Notifications
You must be signed in to change notification settings - Fork 220
/
Copy pathCVE-2023-4785.yml
38 lines (37 loc) · 1.29 KB
/
CVE-2023-4785.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
---
gem: grpc
cve: 2023-4785
ghsa: p25m-jpj4-qcrr
url: https://groups.google.com/g/grpc-io/c/LlLkB1CeE4U
title: Denial of Service Vulnerability in gRPC TCP Server
(Posix-compatible platforms)
date: 2023-09-13
description: |
Lack of error handling in the TCP server in Google's gRPC starting
version 1.23 on posix-compatible platforms (ex. Linux) allows an
attacker to cause a denial of service by initiating a significant
number of connections with the server.
Note that gRPC C++ Python, and Ruby are affected, but
gRPC Java and Go are NOT affected.
cvss_v3: 7.5
unaffected_versions:
- "< 1.53.0"
patched_versions:
- "~> 1.53.2"
- "~> 1.54.3"
- "~> 1.55.3"
- ">= 1.56.2"
related:
url:
- https://nvd.nist.gov/vuln/detail/CVE-2023-4785
- https://groups.google.com/g/grpc-io/c/LlLkB1CeE4U
- https://rubygems.org/gems/grpc/versions/1.53.2
- https://rubygems.org/gems/grpc/versions/1.54.3
- https://rubygems.org/gems/grpc/versions/1.55.3
- https://rubygems.org/gems/grpc/versions/1.56.2
- https://github.com/grpc/grpc/pull/33656
- https://github.com/grpc/grpc/pull/33667
- https://github.com/grpc/grpc/pull/33669
- https://github.com/grpc/grpc/pull/33670
- https://github.com/grpc/grpc/pull/33672
- https://github.com/advisories/GHSA-p25m-jpj4-qcrr