Vulnerability Details CVE-2024-21634
Amazon Ion is a Java implementation of the Ion data notation. Prior to version 1.10.5, a potential denial-of-service issue exists in `ion-java` for applications that use `ion-java` to deserialize Ion text encoded data, or deserialize Ion text or binary encoded data into the `IonValue` model and then invoke certain `IonValue` methods on that in-memory representation. An actor could craft Ion data that, when loaded by the affected application and/or processed using the `IonValue` model, results in a `StackOverflowError` originating from the `ion-java` library. The patch is included in `ion-java` 1.10.5. As a workaround, do not load data which originated from an untrusted source or that could have been tampered with.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 55.3%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2024-21634
-
-
cpe:2.3:a:amazon:ion:1.0.0
-
cpe:2.3:a:amazon:ion:1.0.1
-
cpe:2.3:a:amazon:ion:1.0.2
-
cpe:2.3:a:amazon:ion:1.0.3
-
cpe:2.3:a:amazon:ion:1.1.0
-
cpe:2.3:a:amazon:ion:1.1.1
-
cpe:2.3:a:amazon:ion:1.1.2
-
cpe:2.3:a:amazon:ion:1.10.0
-
cpe:2.3:a:amazon:ion:1.10.1
-
cpe:2.3:a:amazon:ion:1.10.2
-
cpe:2.3:a:amazon:ion:1.10.3
-
cpe:2.3:a:amazon:ion:1.10.4
-
cpe:2.3:a:amazon:ion:1.2.0
-
cpe:2.3:a:amazon:ion:1.3.0
-
cpe:2.3:a:amazon:ion:1.3.1
-
cpe:2.3:a:amazon:ion:1.6.0
-
cpe:2.3:a:amazon:ion:1.6.1
-
cpe:2.3:a:amazon:ion:1.7.0
-
cpe:2.3:a:amazon:ion:1.7.1
-
cpe:2.3:a:amazon:ion:1.8.0
-
cpe:2.3:a:amazon:ion:1.8.1
-
cpe:2.3:a:amazon:ion:1.8.2
-
cpe:2.3:a:amazon:ion:1.8.3
-
cpe:2.3:a:amazon:ion:1.9.0
-
cpe:2.3:a:amazon:ion:1.9.1
-
cpe:2.3:a:amazon:ion:1.9.2
-
cpe:2.3:a:amazon:ion:1.9.3
-
cpe:2.3:a:amazon:ion:1.9.4
-
cpe:2.3:a:amazon:ion:1.9.5
-
cpe:2.3:a:amazon:ion:1.9.6