CVE Vulnerabilities

CVE-2021-29258

Reachable Assertion

Published: May 20, 2021 | Modified: May 27, 2021
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu

An issue was discovered in Envoy 1.14.0. There is a remotely exploitable crash for HTTP2 Metadata, because an empty METADATA map triggers a Reachable Assertion.

Weakness

The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.

Affected Software

Name Vendor Start Version End Version
Envoy Envoyproxy 1.14.6 (including) 1.14.6 (including)
Envoy Envoyproxy 1.15.3 (including) 1.15.3 (including)
Envoy Envoyproxy 1.16.2 (including) 1.16.2 (including)
Envoy Envoyproxy 1.17.1 (including) 1.17.1 (including)
OpenShift Service Mesh 1.1 RedHat servicemesh-proxy-0:1.1.13-1.el8 *
OpenShift Service Mesh 2.0 RedHat servicemesh-proxy-0:2.0.3-1.el8 *

Extended Description

While assertion is good for catching logic errors and reducing the chances of reaching more serious vulnerability conditions, it can still lead to a denial of service. For example, if a server handles multiple simultaneous connections, and an assert() occurs in one single connection that causes all other connections to be dropped, this is a reachable assertion that leads to a denial of service.

Potential Mitigations

References