CVE-2021-37137
high-risk
Published 2021-10-19
The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.
Do I need to act?
~
2.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Banking Apis
Banking Apis
Banking Apis
Banking Apis
Banking Apis
References (26)
Third Party Advisory
https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220210-0012/
Third Party Advisory
https://www.debian.org/security/2023/dsa-5316
Third Party Advisory
https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363
and 6 more references
53
/ 100
high-risk
Severity
26/34 · High
Exploitability
5/34 · Minimal
Exposure
22/34 · High