6.5

CVE-2020-8927

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

Data is provided by the National Vulnerability Database (NVD)
GoogleBrotli Version < 1.0.8
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
FedoraprojectFedora Version31
FedoraprojectFedora Version32
FedoraprojectFedora Version33
FedoraprojectFedora Version34
FedoraprojectFedora Version35
FedoraprojectFedora Version36
CanonicalUbuntu Linux Version16.04 SwEditionesm
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version20.04 SwEditionlts
OpensuseLeap Version15.2
Microsoft.Net Version >= 5.0 <= 5.0.14
Microsoft.Net Core Version >= 3.1 <= 3.1.22
MicrosoftPowershell Version >= 7.0 < 7.0.9
MicrosoftPowershell Version >= 7.1 < 7.1.6
MicrosoftPowershell Version >= 7.2 < 7.2.2
MicrosoftVisual Studio 2019 Version >= 16.0 <= 16.11
MicrosoftVisual Studio 2022 Version >= 17.0 <= 17.0.7
MicrosoftVisual Studio 2022 Version17.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.42% 0.613
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 3.9 2.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
nvd@nist.gov 6.4 10 4.9
AV:N/AC:L/Au:N/C:N/I:P/A:P
cve-coordination@google.com 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

CWE-130 Improper Handling of Length Parameter Inconsistency

The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.

https://github.com/google/brotli/releases/tag/v1.0.9
Third Party Advisory
Release Notes
https://usn.ubuntu.com/4568-1/
Third Party Advisory