An exploitable incorrect return value vulnerability exists in the mp_check function of Tarantools Msgpuck library 1.0.3. A specially crafted packet can cause the mp_check function to incorrectly return success when trying to check if decoding a map16 packet will read outside the bounds of a buffer, resulting in a denial of service vulnerability.
The product reads data past the end, or before the beginning, of the intended buffer.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Msgpuck | Tarantool | 1.0.3 (including) | 1.0.3 (including) |
Msgpuck | Ubuntu | artful | * |
Msgpuck | Ubuntu | bionic | * |
Msgpuck | Ubuntu | cosmic | * |
Msgpuck | Ubuntu | devel | * |
Msgpuck | Ubuntu | disco | * |
Msgpuck | Ubuntu | eoan | * |
Msgpuck | Ubuntu | esm-apps/bionic | * |
Msgpuck | Ubuntu | esm-apps/focal | * |
Msgpuck | Ubuntu | esm-apps/jammy | * |
Msgpuck | Ubuntu | esm-apps/noble | * |
Msgpuck | Ubuntu | esm-apps/xenial | * |
Msgpuck | Ubuntu | focal | * |
Msgpuck | Ubuntu | groovy | * |
Msgpuck | Ubuntu | hirsute | * |
Msgpuck | Ubuntu | impish | * |
Msgpuck | Ubuntu | jammy | * |
Msgpuck | Ubuntu | kinetic | * |
Msgpuck | Ubuntu | lunar | * |
Msgpuck | Ubuntu | mantic | * |
Msgpuck | Ubuntu | noble | * |
Msgpuck | Ubuntu | oracular | * |
Msgpuck | Ubuntu | plucky | * |
Msgpuck | Ubuntu | xenial | * |
Msgpuck | Ubuntu | yakkety | * |
Msgpuck | Ubuntu | zesty | * |
Tarantool | Ubuntu | esm-apps/xenial | * |
Tarantool | Ubuntu | upstream | * |
Tarantool | Ubuntu | xenial | * |
Tarantool | Ubuntu | yakkety | * |
Tarantool | Ubuntu | zesty | * |