Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-35942— Envoy's gRPC access log crash caused by the listener draining

CVSS 6.5 · Medium EPSS 0.02% · P6
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-35942

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Envoy's gRPC access log crash caused by the listener draining
Source: NVD (National Vulnerability Database)
Vulnerability Description
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, gRPC access loggers using listener's global scope can cause a `use-after-free` crash when the listener is drained. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, disable gRPC access log or stop listener update.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
释放后使用
Source: NVD (National Vulnerability Database)
Vulnerability Title
Envoy 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Envoy是一款开源的分布式代理服务器。 Envoy存在资源管理错误漏洞,该漏洞源于使用全局范围的gRPC访问记录器可能会在侦听器耗尽时导致释放后重用崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
envoyproxyenvoy >= 1.26.0, < 1.26.4 -

II. Public POCs for CVE-2023-35942

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-35942

登录查看更多情报信息。

Same Patch Batch · envoyproxy · 2023-07-25 · 4 CVEs total

CVE-2023-359418.6 HIGHEnvoy vulnerable to OAuth2 credentials exploit with permanent validity
CVE-2023-359448.2 HIGHEnvoy vulnerable to incorrect handling of HTTP requests and responses with mixed case sche
CVE-2023-359436.3 MEDIUMEnvoy vulnerable to CORS filter segfault when origin header is removed

IV. Related Vulnerabilities

V. Comments for CVE-2023-35942

No comments yet


Leave a comment