Description
The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Attack Vector
- network
- Complexity
- low
- Privileges
- none
- User Action
- none
- Scope
- unchanged
- Confidentiality
- none
- Integrity
- none
- Availability
- high
- Weaknesses
- CWE-400CWE-400
Metadata
- Primary Vendor
- NETTY
- Published
- 10/19/2021
- Last Modified
- 11/21/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
netty : nettyoracle : banking_apisoracle : banking_apisoracle : banking_apisoracle : banking_apisoracle : banking_apisoracle : banking_digital_experienceoracle : banking_digital_experienceoracle : banking_digital_experienceoracle : banking_digital_experienceoracle : banking_digital_experienceoracle : banking_digital_experienceoracle : banking_digital_experienceoracle : commerce_guided_searchoracle : communications_brm_-_elastic_charging_engineoracle : communications_brm_-_elastic_charging_engineoracle : communications_cloud_native_core_binding_support_functionoracle : communications_diameter_signaling_routeroracle : peoplesoft_enterprise_peopletoolsoracle : peoplesoft_enterprise_peopletoolsoracle : peoplesoft_enterprise_peopletoolsoracle : webcenter_portaloracle : webcenter_portalquarkus : quarkusnetapp : oncommand_insightdebian : debian_linuxdebian : debian_linux
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.