Vulnerability Details : CVE-2020-15206
Potential exploit
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, changing the TensorFlow's `SavedModel` protocol buffer and altering the name of required keys results in segfaults and data corruption while loading the model. This can cause a denial of service in products using `tensorflow-serving` or other inference-as-a-service installments. Fixed were added in commits f760f88b4267d981e13f4b302c437ae800445968 and fcfef195637c6e365577829c4d67681695956e7d (both going into TensorFlow 2.2.0 and 2.3.0 but not yet backported to earlier versions). However, this was not enough, as #41097 reports a different failure mode. The issue is patched in commit adf095206f25471e864a8e63a0f1caef53a0e3a6, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2020-15206
- cpe:2.3:a:google:tensorflow:*:*:*:*:-:*:*:*
- cpe:2.3:a:google:tensorflow:*:*:*:*:-:*:*:*
- cpe:2.3:a:google:tensorflow:*:*:*:*:-:*:*:*
- cpe:2.3:a:google:tensorflow:*:*:*:*:-:*:*:*
- cpe:2.3:a:google:tensorflow:*:*:*:*:-:*:*:*
- cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-15206
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-15206
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
9.0
|
CRITICAL | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
2.2
|
6.0
|
GitHub, Inc. |
CWE ids for CVE-2020-15206
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security-advisories@github.com (Primary)
References for CVE-2020-15206
-
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w5gh-2wr2-pm6g
Incomplete validation in TensorFlow's SavedModel's constant nodes causes segfaults · Advisory · tensorflow/tensorflow · GitHubExploit;Third Party Advisory
-
https://github.com/tensorflow/tensorflow/commit/adf095206f25471e864a8e63a0f1caef53a0e3a6
Validate `NodeDef`s from `FunctionDefLibrary` of a `GraphDef`. · tensorflow/tensorflow@adf0952 · GitHubPatch;Third Party Advisory;Vendor Advisory
-
https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1
Release TensorFlow 2.3.1 · tensorflow/tensorflow · GitHubThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html
[security-announce] openSUSE-SU-2020:1766-1: moderate: Security update fMailing List;Third Party Advisory
Jump to