{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-10237", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://groups.google.com/d/topic/guava-announce/xqWALw4W1vs/discussion", "refsource" : "CONFIRM", "url" : "https://groups.google.com/d/topic/guava-announce/xqWALw4W1vs/discussion" }, { "name" : "RHSA-2018:2423", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2423" }, { "name" : "RHSA-2018:2424", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2424" }, { "name" : "RHSA-2018:2425", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2425" }, { "name" : "RHSA-2018:2428", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2428" }, { "name" : "RHSA-2018:2598", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2598" }, { "name" : "RHSA-2018:2643", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2643" }, { "name" : "RHSA-2018:2740", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2740" }, { "name" : "RHSA-2018:2741", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2741" }, { "name" : "RHSA-2018:2742", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2742" }, { "name" : "RHSA-2018:2743", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2743" }, { "name" : "RHSA-2018:2927", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2927" }, { "name" : "1041707", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id/1041707" } ] } }