The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
07 Nov 2023, 03:36
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-10-19 15:15
Updated : 2023-11-07 03:36
NVD link : CVE-2021-37137
Mitre link : CVE-2021-37137
JSON object : View
Products Affected
oracle
- peoplesoft_enterprise_peopletools
- webcenter_portal
- banking_digital_experience
- communications_diameter_signaling_router
- commerce_guided_search
- communications_brm_-_elastic_charging_engine
- banking_apis
- communications_cloud_native_core_binding_support_function
netapp
- oncommand_insight
debian
- debian_linux
quarkus
- quarkus
netty
- netty
CWE
CWE-400
Uncontrolled Resource Consumption