HIGH · 7.5

CVE-2024-7254

Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing n...

Vulnerability Description

Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
GoogleProtobuf< 3.25.5
GoogleProtobuf-Java< 3.25.5
GoogleProtobuf-Javalite< 3.25.5
GoogleProtobuf-Kotlin< 3.25.5
GoogleProtobuf-Kotlin-Lite< 3.25.5
NetappActive Iq Unified Manager-
NetappBluexp-
NetappOntap Tools10

Related Weaknesses (CWE)

References

FAQ

What is CVE-2024-7254?

CVE-2024-7254 is a vulnerability with a CVSS score of 7.5 (HIGH). Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing n...

How severe is CVE-2024-7254?

CVE-2024-7254 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2024-7254?

Check the references section above for vendor advisories and patch information. Affected products include: Google Protobuf, Google Protobuf-Java, Google Protobuf-Javalite, Google Protobuf-Kotlin, Google Protobuf-Kotlin-Lite.