TROYANOSYVIRUS
Back to CVEs

CVE-2020-8927

MEDIUM
5.3

Description

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

CVE Details

CVSS v3.1 Score5.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published9/15/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoragoogle:brotlimicrosoft:.netmicrosoft:.net_coremicrosoft:powershellmicrosoft:visual_studio_2019microsoft:visual_studio_2022opensuse:leap

Weaknesses (CWE)

CWE-130CWE-120

References

https://usn.ubuntu.com/4568-1/(cve-coordination@google.com)
https://github.com/google/brotli/releases/tag/v1.0.9(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4568-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2020/dsa-4801(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.