CVE-2020-12135Integer Overflow or Wraparound in Mongodb C Driver

Severity
5.5MEDIUMNVD
EPSS
0.3%
top 42.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 24
Latest updateMay 24

Description

bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDmongodb/c_driver< 0.8
Ubuntuwhoopsie_project/whoopsie< 0.2.52.5ubuntu0.5+2

Patches

🔴Vulnerability Details

4
GHSA
GHSA-f54q-h8mw-5h8w: bson before 02022-05-24
OSV
whoopsie vulnerabilities2020-08-04
CVEList
CVE-2020-12135: bson before 02020-04-24
OSV
CVE-2020-12135: bson before 02020-04-24

📋Vendor Advisories

4
Ubuntu
Whoopsie vulnerabilities2020-08-04
Red Hat
xen: bad continuation handling in GNTTABOP_copy (XSA-318)2020-04-14
Red Hat
bson: integer overflow in bson_ensure_space() parameter bytesNeeded2020-04-13
Debian
CVE-2020-12135: duo-unix - bson before 0.8 incorrectly uses int rather than size_t for many variables, para...2020

💬Community

6
Bugzilla
CVE-2020-12135 bson: integer overflow in bson_ensure_space() parameter bytesNeeded2020-05-12
Bugzilla
CVE-2020-12135 libbson: bson: integer overflow in bson_ensure_space() parameter bytesNeeded [fedora-all]2020-05-12
Bugzilla
CVE-2020-12135 mongo-c-driver: bson: integer overflow in bson_ensure_space() parameter bytesNeeded [fedora-all]2020-05-12
Bugzilla
CVE-2020-12135 libbson: bson: integer overflow in bson_ensure_space() parameter bytesNeeded [epel-all]2020-05-12
Bugzilla
CVE-2020-12135 mongo-c-driver: bson: integer overflow in bson_ensure_space() parameter bytesNeeded [epel-all]2020-05-12
CVE-2020-12135 — Integer Overflow or Wraparound | cvebase