First published: Tue Nov 01 2022(Updated: )
protobuf-java core and lite are vulnerable to a denial of service, caused by a flaw in the parsing procedure for textformat data. By sending non-repeated embedded messages with repeated or unknown fields, a remote authenticated attacker could exploit this vulnerability to cause long garbage collection pauses.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/protobuf-java | <3.21.7 | 3.21.7 |
redhat/protobuf-java | <3.20.3 | 3.20.3 |
redhat/protobuf-java | <3.19.6 | 3.19.6 |
redhat/protobuf-java | <3.16.3 | 3.16.3 |
IBM Security Verify Governance | <=10.0 | |
Google Protobuf-java | >=3.16.0<3.16.3 | |
Google Protobuf-java | >=3.19.0<3.19.6 | |
Google Protobuf-java | >=3.20.0<3.20.3 | |
Google Protobuf-java | >=3.21.0<3.21.7 | |
Google Protobuf-javalite | >=3.16.0<3.16.3 | |
Google Protobuf-javalite | >=3.17.0<3.19.6 | |
Google Protobuf-javalite | >=3.20.0<3.20.3 | |
Google Protobuf-javalite | >=3.21.0<3.21.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3509 is a vulnerability in protobuf-java core and lite that allows a remote authenticated attacker to cause a denial of service by exploiting a flaw in the parsing procedure for textformat data.
The severity of CVE-2022-3509 is medium with a CVSS score of 5.7.
An attacker can exploit CVE-2022-3509 by sending non-repeated embedded messages with repeated or unknown fields.
The affected software versions are protobuf-java 3.21.7, 3.20.3, 3.19.6, and 3.16.3.
To fix CVE-2022-3509, update protobuf-java to version 3.21.7 or apply the appropriate fix provided by the vendor.