First published: Fri Sep 29 2023(Updated: )
Apache Avro Java SDK could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization flaw. By sending specially crafted input, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/avro | >=0<1.11.3 | 1.11.3 |
maven/org.apache.avro:avro | <1.11.3 | 1.11.3 |
Apache Avro | <1.11.3 | |
IBM Cognos Analytics | <=12.0.0-12.0.1 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP2 | |
IBM Cognos Analytics | <=11.1.1-11.1.7 FP7 | |
redhat/apache-avro | <1.11.3 | 1.11.3 |
<1.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39410 is a vulnerability in the Apache Avro Java SDK that allows a reader to consume memory beyond the allowed constraints when deserializing untrusted or corrupted data, leading to an out-of-memory condition on the system.
Java applications using Apache Avro Java SDK up to and including version 1.11.2 are affected by CVE-2023-39410.
To fix CVE-2023-39410, users should update to Apache Avro Java SDK version 1.11.3 or later.
The CWE ID of CVE-2023-39410 is CWE-20.
You can find more information about CVE-2023-39410 on the NIST National Vulnerability Database (NVD) website.