Out-of-bounds Write Affecting mongodb package, versions *


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.5% (77th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN9-MONGODB-2636014
  • published13 Apr 2022
  • disclosed12 Apr 2022

Introduced: 12 Apr 2022

CVE-2021-32040  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

There is no fixed version for Debian:9 mongodb.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mongodb package and not the mongodb package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.

It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB Server v4.4 versions prior to and including 4.4.28, MongoDB Server v5.0 versions prior to 5.0.4 and MongoDB Server v4.2 versions prior to 4.2.16.

Workaround: >= v4.2.16 users and all v4.4 users can add the --setParameter internalPipelineLengthLimit=50 instead of the default 1000 to mongod at startup to prevent a crash.

CVSS Scores

version 3.1