漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Sigstore Timestamp Authority allocates excessive memory during request parsing
Vulnerability Description
Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
不对称的资源消耗(放大攻击)
Vulnerability Title
Sigstore Timestamp Authority 安全漏洞
Vulnerability Description
Sigstore Timestamp Authority是sigstore开源的一个RFC3161时间戳授权软件。 Sigstore Timestamp Authority 2.0.3之前版本存在安全漏洞,该漏洞源于api.ParseJSONRequest和api.getContentType函数对非信任数据处理不当,可能导致内存过度分配。
CVSS Information
N/A
Vulnerability Type
N/A