First published: Fri Feb 12 2021(Updated: )
In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large memory allocation, potentially leading to denial of service.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libthrift | <0.14.0 | 0.14.0 |
Apache Hive | <4.0.0 | |
Apache Thrift | >=0.9.3<=0.13.0 | |
Oracle Communications Cloud Native Core Network Slice Selection Function | =1.2.1 | |
Oracle Communications Cloud Native Core Policy | =1.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13949 is a vulnerability in Apache Thrift 0.9.3 to 0.13.0 that allows malicious RPC clients to send short messages resulting in a large memory allocation, potentially leading to denial of service.
The severity of CVE-2020-13949 is high, with a severity value of 7.
Apache Thrift versions 0.9.3 to 0.13.0 are affected by CVE-2020-13949.
To fix CVE-2020-13949, you need to upgrade to Apache Thrift version 0.14.0 or later.
You can find more information about CVE-2020-13949 at the following references: [Reference 1](https://www.openwall.com/lists/oss-security/2021/02/11/2), [Reference 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1928176), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1928175).