Vulnerabilities
Vulnerable Software
Google:  >> Protobuf  Security Vulnerabilities
Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
CVSS Score
7.5
EPSS Score
0.002
Published
2024-09-19
The JsonToBinaryStream() function is part of the protocol buffers C++ implementation and is used to parse JSON from a stream. If the input is broken up into separate chunks in a certain way, the parser will attempt to read bytes from a chunk that has already been freed. 
CVSS Score
7.6
EPSS Score
0.001
Published
2024-05-03
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
CVSS Score
6.5
EPSS Score
0.001
Published
2022-01-26
protobuf allows remote authenticated attackers to cause a heap-based buffer overflow.
CVSS Score
8.8
EPSS Score
0.008
Published
2017-09-25


Contact Us

Shodan ® - All rights reserved