René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

133 lines
4.8 KiB
JSON

{
"id": "CVE-2022-24777",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-03-25T17:15:08.653",
"lastModified": "2022-04-04T14:10:21.727",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "grpc-swift is the Swift language implementation of gRPC, a remote procedure call (RPC) framework. Prior to version 1.7.2, a grpc-swift server is vulnerable to a denial of service attack via a reachable assertion. This is due to incorrect logic when handling GOAWAY frames. The attack is low-effort: it takes very little resources to construct and send the required sequence of frames. The impact on availability is high as the server will crash, dropping all in flight connections and requests. This issue is fixed in version 1.7.2. There are currently no known workarounds."
},
{
"lang": "es",
"value": "grpc-swift es la implementaci\u00f3n en lenguaje Swift de gRPC, un framework de llamadas a procedimientos remotos (RPC). En versiones anteriores a 1.7.2, un servidor grpc-swift es vulnerable a un ataque de denegaci\u00f3n de servicio por medio de una aserci\u00f3n alcanzable. Esto es debido a una l\u00f3gica incorrecta cuando son manejadas las tramas GOAWAY. El ataque es de bajo esfuerzo: son necesarios muy pocos recursos para construir y enviar la secuencia de tramas requerida. El impacto en la disponibilidad es alto, ya que el servidor ser\u00e1 bloqueado, dejando caer todas las conexiones y peticiones en vuelo. Este problema ha sido corregido en la versi\u00f3n 1.7.2. Actualmente no se presentan medidas de mitigaci\u00f3n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:grpc_swift:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.7.2",
"matchCriteriaId": "DFEEEA82-896D-4820-AA81-B3E270D64C1A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/grpc/grpc-swift/commit/858f977f2a51fca2292f384cf7a108dc2e73a3bd",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/grpc/grpc-swift/security/advisories/GHSA-r6ww-5963-7r95",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}