CPANSA-IO-Compress-Brotli-2020-8927-brotli: IO-Compress-Brotli vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2020-09-15T00:00:00 Engine CSAF Perl Toolkit 0.25
Current release date 2020-09-15T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score 5.3 Severity Medium
Original language Language en
Also referred to

Vulnerability Description

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

Vulnerabilities

CVE-2020-8927

Vulnerability Description

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

Weakness CWE-130 : Improper Handling of Length Parameter Inconsistency

Product status

Known affected
Product Score
IO-Compress-Brotli equal =0.004_002
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
3.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N 5.3 Medium
2.0 AV:N/AC:L/Au:N/C:N/I:P/A:P 6.4 Medium

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Tue Sep 15 00:00:00 2020 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/