First published: Fri Nov 13 2020(Updated: )
In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly disallows a peer to send such messages, a hand crafted AMQP 1.0 client could exploit this behavior in order to send a message of unlimited size to the adapter, eventually causing the adapter to fail with an out of memory exception.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Hono | =1.3.0 | |
Eclipse Hono | =1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27217 has not been assigned a specific severity rating by public databases but poses a risk of denial of service due to message overflow.
To resolve CVE-2020-27217, upgrade to Eclipse Hono version 1.5.0 or later where the message size verification has been implemented.
CVE-2020-27217 affects Eclipse Hono versions 1.3.0 and 1.4.0.
While CVE-2020-27217 is primarily a denial of service vulnerability, improperly handled large messages could potentially lead to data loss.
A temporary workaround for CVE-2020-27217 may involve monitoring and limiting the incoming message sizes manually until an upgrade can be performed.