CVE Vulnerabilities

CVE-2020-13949

Uncontrolled Resource Consumption

Published: Feb 12, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW

In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large memory allocation, potentially leading to denial of service.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

Name Vendor Start Version End Version
Hive Apache * 4.0.0 (excluding)
Thrift Apache 0.9.3 (including) 0.13.0 (including)
Red Hat Fuse 7.10 RedHat libthrift *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-glassfish-el-0:3.0.1-4.b08_redhat_00005.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-hibernate-0:5.1.17-3.Final_redhat_00004.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-jackson-databind-0:2.8.11.6-3.SP1_redhat_00003.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-jboss-ejb-client-0:4.0.12-1.Final_redhat_00002.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-netty-0:4.1.63-2.Final_redhat_00003.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-undertow-0:1.4.18-16.SP14_redhat_00001.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-wildfly-0:7.1.11-4.GA_redhat_00002.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-wildfly-elytron-0:1.1.14-1.Final_redhat_00001.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-wildfly-http-client-0:1.0.21-1.Final_redhat_00001.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-wildfly-naming-client-0:1.0.13-1.Final_redhat_00001.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-wildfly-openssl-0:1.0.12-1.Final_redhat_00001.1.ep7.el7 *
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 RedHat eap7-wildfly-openssl-linux-0:1.0.12-6.Final_redhat_00001.1.ep7.el7 *
Red Hat OpenShift Jaeger 1.20 RedHat distributed-tracing/jaeger-agent-rhel8:1.20.4-18 *
Red Hat OpenShift Jaeger 1.20 RedHat distributed-tracing/jaeger-all-in-one-rhel8:1.20.4-18 *
Red Hat OpenShift Jaeger 1.20 RedHat distributed-tracing/jaeger-collector-rhel8:1.20.4-18 *
Red Hat OpenShift Jaeger 1.20 RedHat distributed-tracing/jaeger-ingester-rhel8:1.20.4-17 *
Red Hat OpenShift Jaeger 1.20 RedHat distributed-tracing/jaeger-query-rhel8:1.20.4-18 *
Red Hat OpenShift Jaeger 1.20 RedHat distributed-tracing/jaeger-rhel8-operator:1.20.4-18 *
Thrift Ubuntu focal *
Thrift Ubuntu groovy *
Thrift Ubuntu hirsute *
Thrift Ubuntu impish *
Thrift Ubuntu kinetic *
Thrift Ubuntu lunar *
Thrift Ubuntu mantic *
Thrift Ubuntu oracular *
Thrift Ubuntu trusty *

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References