// For flags

CVE-2020-8927

Buffer overflow in Brotli library

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

Se presenta un desbordamiento del búfer en la biblioteca Brotli versiones anteriores a 1.0.8, donde un atacante que controla la longitud de entrada de una petición de descompresión "one-shot" en un script puede desencadenar un bloqueo, que ocurre cuando se copian fragmentos de datos de más de 2 GiB . Se recomienda actualizar su biblioteca de Brotli a la versión 1.0.8 o posterior. Si no se puede actualizar, recomendamos usar la API "streaming" en lugar de la API "one-shot" e imponer límites de tamaño de fragmentos

A buffer overflow flaw was found in the Brotli library where an attacker could control the input length of a "one-shot" decompression request to a script that can trigger a crash. This issue can happen when copying chunks of data larger than 2 GiB.

*Credits: Jay Lv <nengzhi.pnz@antgroup.com>
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-02-12 CVE Reserved
  • 2020-09-15 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
  • CWE-130: Improper Handling of Length Parameter Inconsistency
CAPEC
References (16)
URL Date SRC
URL Date SRC
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html 2023-11-07
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH 2023-11-07
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF 2023-11-07
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6 2023-11-07
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6 2023-11-07
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP 2023-11-07
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27 2023-11-07
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I 2023-11-07
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK 2023-11-07
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG 2023-11-07
https://usn.ubuntu.com/4568-1 2023-11-07
https://www.debian.org/security/2020/dsa-4801 2023-11-07
https://access.redhat.com/security/cve/CVE-2020-8927 2022-03-10
https://bugzilla.redhat.com/show_bug.cgi?id=1879225 2022-03-10
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Google
Search vendor "Google"
Brotli
Search vendor "Google" for product "Brotli"
< 1.0.8
Search vendor "Google" for product "Brotli" and version " < 1.0.8"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
31
Search vendor "Fedoraproject" for product "Fedora" and version "31"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
32
Search vendor "Fedoraproject" for product "Fedora" and version "32"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
33
Search vendor "Fedoraproject" for product "Fedora" and version "33"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
34
Search vendor "Fedoraproject" for product "Fedora" and version "34"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
35
Search vendor "Fedoraproject" for product "Fedora" and version "35"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
36
Search vendor "Fedoraproject" for product "Fedora" and version "36"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
16.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04"
esm
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
18.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
20.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "20.04"
lts
Affected
Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
15.2
Search vendor "Opensuse" for product "Leap" and version "15.2"
-
Affected
Microsoft
Search vendor "Microsoft"
.net
Search vendor "Microsoft" for product ".net"
>= 5.0 <= 5.0.14
Search vendor "Microsoft" for product ".net" and version " >= 5.0 <= 5.0.14"
-
Affected
Microsoft
Search vendor "Microsoft"
.net Core
Search vendor "Microsoft" for product ".net Core"
>= 3.1 <= 3.1.22
Search vendor "Microsoft" for product ".net Core" and version " >= 3.1 <= 3.1.22"
-
Affected
Microsoft
Search vendor "Microsoft"
Powershell
Search vendor "Microsoft" for product "Powershell"
>= 7.0 < 7.0.9
Search vendor "Microsoft" for product "Powershell" and version " >= 7.0 < 7.0.9"
-
Affected
Microsoft
Search vendor "Microsoft"
Powershell
Search vendor "Microsoft" for product "Powershell"
>= 7.1 < 7.1.6
Search vendor "Microsoft" for product "Powershell" and version " >= 7.1 < 7.1.6"
-
Affected
Microsoft
Search vendor "Microsoft"
Powershell
Search vendor "Microsoft" for product "Powershell"
>= 7.2 < 7.2.2
Search vendor "Microsoft" for product "Powershell" and version " >= 7.2 < 7.2.2"
-
Affected
Microsoft
Search vendor "Microsoft"
Visual Studio 2019
Search vendor "Microsoft" for product "Visual Studio 2019"
>= 16.0 <= 16.11
Search vendor "Microsoft" for product "Visual Studio 2019" and version " >= 16.0 <= 16.11"
-
Affected
Microsoft
Search vendor "Microsoft"
Visual Studio 2022
Search vendor "Microsoft" for product "Visual Studio 2022"
>= 17.0 <= 17.0.7
Search vendor "Microsoft" for product "Visual Studio 2022" and version " >= 17.0 <= 17.0.7"
-
Affected
Microsoft
Search vendor "Microsoft"
Visual Studio 2022
Search vendor "Microsoft" for product "Visual Studio 2022"
17.1
Search vendor "Microsoft" for product "Visual Studio 2022" and version "17.1"
-
Affected