CVE-2023-35942Use After Free in Envoy

CWE-416Use After Free2 documents2 sources
Severity
6.5MEDIUMNVD
EPSS
0.0%
top 94.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 25

Description

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, gRPC access loggers using listener's global scope can cause a `use-after-free` crash when the listener is drained. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, disable gRPC access log or stop listener update.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5envoyproxy/envoy< 1.23.12+3
NVDenvoyproxy/envoy1.23.01.23.12+3

📋Vendor Advisories

1
Red Hat
envoy: gRPC access log crash caused by the listener draining2023-07-25
CVE-2023-35942 — Use After Free in Envoyproxy Envoy | cvebase