Google Grpc vulnerabilities
6 known vulnerabilities affecting google/grpc.
Total CVEs
6
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH4MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2024-7246MEDIUMCVSS 6.3v1.53.0v1.53.1+40 more2024-08-06
CVE-2024-7246 [MEDIUM] CWE-440 CVE-2024-7246: It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between
It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values.
This occurs because the error status for a misencoded header is not cleared betwe
cvelistv5nvd
CVE-2023-4785HIGHCVSS 7.5≥ 1.56.0, ≤ 1.56.1≥ 1.55.0, ≤ 1.55.2+2 more2023-09-13
CVE-2023-4785 [HIGH] CWE-248 CVE-2023-4785: Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible
Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.
cvelistv5nvd
CVE-2023-33953HIGHCVSS 7.5fixed in 1.56.12023-08-09
CVE-2023-33953 [HIGH] CWE-789 CVE-2023-33953: gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disco
gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks:
- Unbounded memory buffering in the HPACK parser
- Unbounded CPU consumption in the HPACK parser
The unbounded CPU consumption is d
cvelistv5nvd
CVE-2023-1428HIGHCVSS 7.5≥ 1.51, < 1.532023-06-09
CVE-2023-1428 [HIGH] CWE-617 CVE-2023-1428: There exists an vulnerability causing an abort() to be called in gRPC.
The following headers cause
There exists an vulnerability causing an abort() to be called in gRPC.
The following headers cause gRPC's C++ implementation to abort() when called via http2:
te: x (x != trailers)
:scheme: x (x != http, https)
grpclb_client_stats: x (x == anything)
On top of sending one of those headers, a later header must be sent that gets the total header size pa
cvelistv5nvd
CVE-2023-32731HIGHCVSS 7.5≥ 1.53, ≤ 1.542023-06-09
CVE-2023-32731 [HIGH] CWE-440 CVE-2023-32731: When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK
When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted
cvelistv5nvd
CVE-2023-32732MEDIUMCVSS 5.3≥ 1.53, < 1.542023-06-09
CVE-2023-32732 [MEDIUM] CWE-440 CVE-2023-32732: gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2
gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in https://github.com/grpc/grpc/pull/3
cvelistv5nvd