Integer Overflow Affecting google-protobuf package, versions <3.4.0
Threat Intelligence
EPSS
1.68% (89th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUBY-GOOGLEPROTOBUF-472379
- published 10 Mar 2019
- disclosed 25 Sep 2017
- credit Unknown
Introduced: 25 Sep 2017
CVE-2015-5237 Open this link in a new tabHow to fix?
Upgrade google-protobuf
to version 3.4.0 or higher.
Overview
google-protobuf is a Google's data interchange format.
Affected versions of this package are vulnerable to Integer Overflow by allowing remote authenticated attackers to cause a heap-based buffer overflow in serialisation process.
References
CVSS Scores
version 3.1