Buffer Overflow Affecting librdkafka.redist Open this link in a new tab package, versions [,1.4.0)
Attack Complexity
Low
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-DOTNET-LIBRDKAFKAREDIST-1316329
-
published
15 Apr 2020
-
disclosed
15 Apr 2020
-
credit
Unknown
Introduced: 15 Apr 2020
CWE-120 Open this link in a new tabHow to fix?
Upgrade librdkafka.redist
to version 1.4.0 or higher.
Overview
Affected versions of this package are vulnerable to Buffer Overflow. In the SASL SCRAM protocol handler if sasl.username
and sasl.password
contained characters that needed escaping, a buffer overflow and heap corruption occurs. This is protected, but too late, by an assertion.