Exploit
CVE-2024-7254

Improper Input Validation (CWE-20)

Published: Sep 19, 2024 / Updated: 2mo ago

010
CVSS 8.7EPSS 0.04%High
CVE info copied to clipboard

Summary

Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can be corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.

Impact

This vulnerability can lead to stack overflow attacks, potentially causing application crashes or allowing arbitrary code execution. It affects projects using Google's Protocol Buffers (protobuf) library for parsing untrusted data. The impact could be severe, as it may allow attackers to crash applications or potentially execute malicious code, compromising the integrity and availability of affected systems.

Exploitation

One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability was addressed in a GitHub advisory (GHSA-735f-pc8j-v9w8) on September 18, 2024. Additionally, Oracle released a patch as part of their Critical Patch Update on October 15, 2024.

Mitigation

1. Update to the latest version of the protobuf library as soon as possible. 2. Implement input validation to limit the depth of nested groups in Protocol Buffers data. 3. Use a parser that enforces limits on recursion depth when processing Protocol Buffers. 4. Consider using the DiscardUnknownFieldsParser or Java Protobuf Lite parser only with trusted input. 5. Monitor and log any attempts to exploit this vulnerability. 6. Implement proper error handling to gracefully manage potential stack overflow situations.

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Timeline

Vendor Advisory

GitHub Advisories released a security advisory.

Sep 18, 2024 at 11:52 PM
CVE Assignment

NVD published the first details for CVE-2024-7254

Sep 19, 2024 at 1:15 AM
First Article

Feedly found the first article mentioning CVE-2024-7254. See article

Sep 19, 2024 at 1:23 AM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 19, 2024 at 1:23 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (5001055)

Sep 19, 2024 at 7:53 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (5001047)

Sep 19, 2024 at 7:53 AM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.6%)

Sep 19, 2024 at 9:45 AM
Threat Intelligence Report

CVE-2024-7254 is a critical vulnerability with a CVSS score of 9.8, indicating a high risk of exploitation. Currently, there are reports of active exploitation in the wild, particularly by sophisticated threat actors, and proof-of-concept exploits have been made available. Mitigations and patches are being developed, but organizations should remain vigilant as this vulnerability may have downstream impacts on third-party vendors and related technologies. See article

Sep 20, 2024 at 8:11 AM
CVSS

A CVSS base score of 8.7 has been assigned.

Sep 20, 2024 at 12:38 PM / nvd
Static CVE Timeline Graph

Affected Systems

Google/protobuf
+null more

Exploits

https://github.com/advisories/GHSA-735f-pc8j-v9w8
+null more

Patches

Github Advisory
+null more

Links to Mitre Att&cks

T1562.003: Impair Command History Logging
+null more

Attack Patterns

CAPEC-10: Buffer Overflow via Environment Variables
+null more

Vendor Advisory

Oracle Critical Patch Update Advisory - October 2024
Oracle Id: cpuoct2024 Release Date: 2024-10-15 Update Date: 2024-10-15 Description A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories. Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches.

References

CVE-2024-7254 - Exploits & Severity - Feedly
This vulnerability can lead to stack overflow attacks, potentially causing application crashes or allowing arbitrary code execution. Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can be corrupted by exceeding the stack limit i.e. StackOverflow.
Multiple vulnerabilities in IBM Process Mining
The vulnerability exists due to a boundary error when processing TIFF images within the rotateImage() function in /libtiff/tools/tiffcrop.c. A remote attacker can pass a specially crafted image to the application, trigger memory corruption and perform a denial of service (DoS) attack. The vulnerability exists due to heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c. A remote unauthenticated attacker can trick the victim into opening a specially crafted crafted TIFF file, trigger memory corruption and cause the affected software to crash, resulting in a DoS condition.

News

Security Bulletin: IBM WebSphere Application Server Liberty, which is bundled with IBM WebSphere Hybrid Edition, is vulnerable to a denial of service due to Google Protocol Buffers (CVE-2024-7254)
Summary IBM WebSphere Application Server Liberty, which is bundled with IBM WebSphere Hybrid Edition, contains a vulnerability in the Google Protocol Buffers (protobuf) library with the grpc-1.0 or grpcClient-1.0 feature enabled. Vulnerability Details Refer to the security bulletin(s) listed in the Remediation/Fixes section Affected Products and Versions Affected Product(s) and Version(s) Affecting Product(s) and Version(s) --- --- IBM WebSphere Hybrid Edition 5.1 IBM WebSphere Application Server Liberty 20.0.0.12 - 24.0.0.10 Remediation/Fixes IBM strongly recommends addressing the vulnerability now by applying a currently available interim fix or fix pack that contains the APAR PH63533, as described in Security Bulletin: IBM WebSphere Application Server Liberty is vulnerable to a denial of service due to Google Protocol Buffers (CVE-2024-7254). Workarounds and Mitigations...
ALAS-2024-2693 (important): protobuf
Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker. Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow.
Red Hat Security Advisory 2024-9571-03
Red Hat Security Advisory 2024-9571-03 - Streams for Apache Kafka 2.8.0 is now available from the Red Hat Customer Portal. Issues addressed include denial of service and man-in-the-middle vulnerabilities.
RHSA-2024:9571: Moderate: Streams for Apache Kafka 2.8.0 release and security update
Moderate: Streams for Apache Kafka 2.8.0 release and security update Zookeeper, Kafka, Drain Cleaner, Cruise Control: Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader "(CVE-2024-47554)"
IBM App Connect Enterprise update for Google Protocol Buffers
A remote attacker can pass specially crafted input to the application to create unbounded recursions and perform a denial of service (DoS) attack. The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
See 75 more articles and social media posts

CVSS V3.1

Unknown

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI