First published: Wed Sep 13 2023(Updated: )
Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.
Credit: cve-coordination@google.com cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Grpc Grpc | >=1.23.0<1.53.2 | |
Grpc Grpc | >=1.54.0<1.54.3 | |
Grpc Grpc | >=1.55.0<1.55.3 | |
Grpc Grpc | =1.56.0 | |
pip/grpcio | >=1.53.0<1.53.2 | 1.53.2 |
pip/grpcio | >=1.54.0<1.54.3 | 1.54.3 |
pip/grpcio | >=1.55.0<1.55.3 | 1.55.3 |
rubygems/grpc | >=1.53.0<1.53.2 | 1.53.2 |
rubygems/grpc | >=1.54.0<1.54.3 | 1.54.3 |
rubygems/grpc | >=1.55.0<1.55.3 | 1.55.3 |
rubygems/grpc | >=1.56.0<1.56.2 | 1.56.2 |
redhat/grpc | <1.53.2 | 1.53.2 |
redhat/grpc | <1.54.3 | 1.54.3 |
redhat/grpc | <1.55.3 | 1.55.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4785 is a vulnerability in Google's gRPC library that allows an attacker to cause a denial of service by initiating a significant number of connections with the server.
CVE-2023-4785 affects posix-compatible platforms (e.g., Linux) where Google's gRPC version 1.23 or later is used.
CVE-2023-4785 has a severity rating of 7.5 (high).
An attacker can exploit CVE-2023-4785 by initiating a significant number of connections with the gRPC server, causing a denial of service.
Yes, fixes for CVE-2023-4785 have been released. It is recommended to update to a patched version of Google's gRPC library to mitigate the vulnerability.