Vulnerability Description
Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Grpc | Grpc | >= 1.23.0, < 1.53.2 |
Related Weaknesses (CWE)
References
- https://github.com/grpc/grpc/pull/33656Issue TrackingPatch
- https://github.com/grpc/grpc/pull/33667Issue Tracking
- https://github.com/grpc/grpc/pull/33669Issue Tracking
- https://github.com/grpc/grpc/pull/33670Issue Tracking
- https://github.com/grpc/grpc/pull/33672Issue Tracking
- https://github.com/grpc/grpc/pull/33656Issue TrackingPatch
- https://github.com/grpc/grpc/pull/33667Issue Tracking
- https://github.com/grpc/grpc/pull/33669Issue Tracking
- https://github.com/grpc/grpc/pull/33670Issue Tracking
- https://github.com/grpc/grpc/pull/33672Issue Tracking
FAQ
What is CVE-2023-4785?
CVE-2023-4785 is a vulnerability with a CVSS score of 7.5 (HIGH). Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant nu...
How severe is CVE-2023-4785?
CVE-2023-4785 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-4785?
Check the references section above for vendor advisories and patch information. Affected products include: Grpc Grpc.