First published: Tue Dec 15 2020(Updated: )
Envoy before 1.16.1 mishandles dropped and truncated datagrams, as demonstrated by a segmentation fault for a UDP packet size larger than 1500.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cloud Pak for Security (CP4S) | <=1.6.0.1 | |
IBM Cloud Pak for Security (CP4S) | <=1.6.0.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.5.0.1 | |
IBM Cloud Pak for Security (CP4S) | <=1.5.0.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.4.0.0 | |
Envoyproxy Envoy | <1.16.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Envoy Proxy vulnerability is CVE-2020-35471.
The severity level of CVE-2020-35471 is high, with a CVSS score of 7.5.
The affected software by CVE-2020-35471 includes Envoy Proxy versions up to 1.16.1 and IBM Cloud Pak for Security (CP4S) versions up to 1.6.0.1.
CVE-2020-35471 causes a denial of service by mishandling dropped and truncated datagrams, allowing a remote attacker to exploit the vulnerability by sending an overly large UDP packet.
You can find more information about CVE-2020-35471 on the GitHub links provided: [link1](https://github.com/envoyproxy/envoy/compare/v1.16.0...v1.16.1), [link2](https://github.com/envoyproxy/envoy/issues/14113), [link3](https://github.com/envoyproxy/envoy/pull/14122).