Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Missing upper bound check on chunk length in snappy-java
Vulnerability Description
snappy-java is a Java port of the snappy, a fast C++ compresser/decompresser developed by Google. The SnappyInputStream was found to be vulnerable to Denial of Service (DoS) attacks when decompressing data with a too large chunk size. Due to missing upper bound check on chunk length, an unrecoverable fatal error can occur. All versions of snappy-java including the latest released version 1.1.10.3 are vulnerable to this issue. A fix has been introduced in commit `9f8c3cf74` which will be included in the 1.1.10.4 release. Users are advised to upgrade. Users unable to upgrade should only accept compressed data from trusted sources.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
不加限制或调节的资源分配
Vulnerability Title
Snappy 安全漏洞
Vulnerability Description
Snappy是KNP Labs个人开发者的一个 PHP 库,允许从 url 或 html 页面生成缩略图、快照或 PDF。 Snappy 1.1.10.3及之前版本存在安全漏洞,该漏洞源于SnappyInputStream缺少对块长度的上限检查,导致解压过大的数据时容易受到拒绝服务(DoS)攻击。
CVSS Information
N/A
Vulnerability Type
N/A