CVE Vulnerabilities

CVE-2020-8927

Improper Handling of Length Parameter Inconsistency

Published: Sep 15, 2020 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:P
RedHat/V2
RedHat/V3
6.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Ubuntu
MEDIUM

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a one-shot decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the streaming API as opposed to the one-shot API, and impose chunk size limits.

Weakness

The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.

Affected Software

Name Vendor Start Version End Version
Brotli Google * 1.0.8 (excluding)
.NET Core on Red Hat Enterprise Linux RedHat rh-dotnet31-dotnet-0:3.1.417-1.el7_9 *
.NET Core on Red Hat Enterprise Linux RedHat rh-dotnet50-dotnet-0:5.0.212-1.el7_9 *
Red Hat Enterprise Linux 8 RedHat brotli-0:1.0.6-3.el8 *
Red Hat Enterprise Linux 8 RedHat dotnet3.1-0:3.1.417-1.el8_5 *
Red Hat Enterprise Linux 8 RedHat dotnet5.0-0:5.0.212-1.el8_5 *
Red Hat Enterprise Linux 8 RedHat brotli-0:1.0.6-3.el8 *
Brotli Ubuntu bionic *
Brotli Ubuntu devel *
Brotli Ubuntu focal *
Brotli Ubuntu trusty *
Brotli Ubuntu upstream *
Brotli Ubuntu xenial *

Potential Mitigations

References