Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-8927— Buffer overflow in Brotli library

CVSS 5.3 · Medium EPSS 0.31% · P54
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-8927

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Buffer overflow in Brotli library
Source: NVD (National Vulnerability Database)
Vulnerability Description
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
长度参数不一致性处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Google brotli Library 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Google brotli Library是美国谷歌(Google)公司的一种数据压缩算法的扩展库使用 LZ77 算法、赫夫曼编码和二阶上下文建模的现代变体组合来压缩数据,其压缩比可与目前可用的最佳通用压缩方法相媲美。 Google brotli Library 1.0.8之前版本存在缓冲区错误漏洞,攻击者控制脚本的一次性解压缩请求的输入长度可能会触发崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Google LLCBrotli stable ~ 1.0.7 -

II. Public POCs for CVE-2020-8927

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-8927

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2020-8927

No comments yet


Leave a comment