Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
History

Tue, 17 Dec 2024 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat trusted Profile Analyzer
CPEs cpe:/a:redhat:trusted_profile_analyzer:1.2::el9
Vendors & Products Redhat trusted Profile Analyzer

Fri, 13 Dec 2024 14:45:00 +0000

Type Values Removed Values Added
References

Thu, 05 Dec 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat quarkus
CPEs cpe:/a:redhat:quarkus:3.2::el8
Vendors & Products Redhat quarkus

Thu, 14 Nov 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat amq Streams
CPEs cpe:/a:redhat:amq_streams:2
Vendors & Products Redhat amq Streams

Fri, 11 Oct 2024 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat camel Quarkus
CPEs cpe:/a:redhat:camel_quarkus:3.8
Vendors & Products Redhat
Redhat camel Quarkus

Thu, 19 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google google-protobuf
Google protobuf
Google protobuf-java
Google protobuf-javalite
Google protobuf-kotlin
Google protobuf-kotlin-lite
CPEs cpe:2.3:a:google:google-protobuf:*:*:*:*:*:ruby:*:*
cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-kotlin-lite:*:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:*
cpe:2.3:a:google:protobuf:*:*:*:*:*:*:*:*
Vendors & Products Google
Google google-protobuf
Google protobuf
Google protobuf-java
Google protobuf-javalite
Google protobuf-kotlin
Google protobuf-kotlin-lite
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Sep 2024 09:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Important


Thu, 19 Sep 2024 00:30:00 +0000

Type Values Removed Values Added
Description Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
Title Stack overflow in Protocol Buffers Java Lite
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published: 2024-09-19T00:18:45.824Z

Updated: 2024-12-13T13:09:27.312Z

Reserved: 2024-07-29T21:41:56.116Z

Link: CVE-2024-7254

cve-icon Vulnrichment

Updated: 2024-12-13T13:09:27.312Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-19T01:15:10.963

Modified: 2024-12-13T14:15:22.800

Link: CVE-2024-7254

cve-icon Redhat

Severity : Important

Publid Date: 2024-09-19T01:15:10Z

Links: CVE-2024-7254 - Bugzilla