First published: Thu Jan 06 2022(Updated: )
A flaw was found in protobuf-java. Google Protocol Buffer (protobuf-java) allows the interleaving of com.google.protobuf.UnknownFieldSet fields. By persuading a victim to open specially-crafted content, a remote attacker could cause a timeout in the ProtobufFuzzer function, resulting in a denial of service.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/protobuf | <3.16.1 | 3.16.1 |
redhat/protobuf | <3.18.2 | 3.18.2 |
redhat/protobuf | <3.19.2 | 3.19.2 |
Google Protobuf Ruby | <3.19.2 | |
Protocol Buffers | <3.16.1 | |
Protocol Buffers | >=3.18.0<3.18.2 | |
Protocol Buffers | >=3.19.0<3.19.2 | |
Protocol Buffers | <3.18.2 | |
Protocol Buffers | >=3.19.0<3.19.2 | |
Oracle Communications Cloud Native Core Console | =1.9.0 | |
Oracle Communications Cloud Native Core Network Repository Function | =1.15.0 | |
Oracle Communications Cloud Native Core Network Repository Function | =1.15.1 | |
Oracle Communications Cloud Native Core Policy | =1.15.0 | |
Oracle MapViewer | =19c | |
Oracle MapViewer | =21c | |
IBM Security Verify Governance - Identity Manager | <=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2021-22569.
The severity of CVE-2021-22569 is medium with a severity value of 5.5.
The affected software of CVE-2021-22569 is Google Protocol Buffer (protobuf-java) versions 3.16.1, 3.18.2, and 3.19.2, as well as IBM Disconnected Log Collector versions v1.0 to v1.8.2.
The vulnerability CVE-2021-22569 can be exploited by persuading a victim to open a specially-crafted content, causing a timeout.
Yes, there are fixes available for CVE-2021-22569. For Google Protocol Buffer (protobuf-java), the recommended fix is to upgrade to version 3.16.1, 3.18.2, or 3.19.2. For IBM Disconnected Log Collector, the recommended fix is to upgrade to a version higher than v1.8.2.