Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.
References
Link | Resource |
---|---|
https://github.com/grpc/grpc/pull/33656 | Issue Tracking Patch |
https://github.com/grpc/grpc/pull/33667 | Issue Tracking |
https://github.com/grpc/grpc/pull/33669 | Issue Tracking |
https://github.com/grpc/grpc/pull/33670 | Issue Tracking |
https://github.com/grpc/grpc/pull/33672 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-09-13 17:15
Updated : 2023-09-19 16:02
NVD link : CVE-2023-4785
Mitre link : CVE-2023-4785
CVE.ORG link : CVE-2023-4785
JSON object : View
Products Affected
grpc
- grpc
CWE