cve/2024/CVE-2024-37168.md

18 lines
1.2 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-37168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37168)
![](https://img.shields.io/static/v1?label=Product&message=grpc-node&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%201.10.0%2C%20%3C%201.10.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value&color=brighgreen)
### Description
@grpc/grps-js implements the core functionality of gRPC purely in JavaScript, without a C++ addon. Prior to versions 1.10.9, 1.9.15, and 1.8.22, there are two separate code paths in which memory can be allocated per message in excess of the `grpc.max_receive_message_length` channel option: If an incoming message has a size on the wire greater than the configured limit, the entire message is buffered before it is discarded; and/or if an incoming message has a size within the limit on the wire but decompresses to a size greater than the limit, the entire message is decompressed into memory, and on the server is not discarded. This has been patched in versions 1.10.9, 1.9.15, and 1.8.22.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/MayurManjrekar/DevSecOps-Demo