First published: Wed Mar 24 2021(Updated: )
An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable integer overflow in which a very large grpc-timeout value leads to unexpected timeout calculations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/envoyproxy/envoy | <1.17.2 | 1.17.2 |
Envoy Proxy | =1.14.6 | |
Envoy Proxy | =1.15.3 | |
Envoy Proxy | =1.16.2 | |
Envoy Proxy | =1.17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28682 is a vulnerability discovered in Envoy through 1.71.1 that allows remote exploitation of an integer overflow leading to unexpected timeout calculations.
CVE-2021-28682 has a severity rating of 7.5 (High).
Envoy versions 1.14.6, 1.15.3, 1.16.2, 1.17.1, and up to, but excluding, 1.17.2 are affected by CVE-2021-28682.
To fix CVE-2021-28682, upgrade your Envoy software to version 1.17.2 or higher.
You can find more information about CVE-2021-28682 in the following references: [Link 1](https://blog.envoyproxy.io), [Link 2](https://github.com/envoyproxy/envoy/blob/15e3b9dbcc9aaa9d391fa8033904aad1ea1ae70d/api/envoy/api/v2/cluster.proto#L36), [Link 3](https://github.com/envoyproxy/envoy/releases).