Vulnerability Details : CVE-2020-5234
MessagePack for C# and Unity before version 1.9.11 and 2.1.90 has a vulnerability where untrusted data can lead to DoS attack due to hash collisions and stack overflow. Review the linked GitHub Security Advisory for more information and remediation steps.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2020-5234
- cpe:2.3:a:messagepack:messagepack:*:*:*:*:*:c\#:*:*
- cpe:2.3:a:messagepack:messagepack:*:*:*:*:*:c\#:*:*
- cpe:2.3:a:messagepack:messagepack:2.0.94:alpha:*:*:*:c\#:*:*
- cpe:2.3:a:messagepack:messagepack:2.0.110:alpha:*:*:*:c\#:*:*
- cpe:2.3:a:messagepack:messagepack:2.0.119:beta:*:*:*:c\#:*:*
- cpe:2.3:a:messagepack:messagepack:2.0.123:beta:*:*:*:c\#:*:*
- cpe:2.3:a:messagepack:messagepack:2.0.204:beta:*:*:*:c\#:*:*
- cpe:2.3:a:messagepack:messagepack:2.0.270:rc:*:*:*:c\#:*:*
- cpe:2.3:a:messagepack:messagepack:2.0.299:rc:*:*:*:c\#:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-5234
1.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-5234
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:C |
8.0
|
6.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST | |
4.8
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H |
1.2
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2020-5234
-
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).Assigned by: security-advisories@github.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-5234
-
https://github.com/neuecc/MessagePack-CSharp/issues/810
MessagePackSecurity.GetEqualityComparer<object> returns null on copied instances · Issue #810 · neuecc/MessagePack-CSharp · GitHub
-
https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02
Merge security fixes in for v2.1 · neuecc/MessagePack-CSharp@56fa862 · GitHubPatch;Third Party Advisory
-
https://github.com/neuecc/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf
Untrusted data can lead to DoS attack due to hash collisions and stack overflow · Advisory · neuecc/MessagePack-CSharp · GitHubThird Party Advisory
-
https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007
Merge pull request #811 from AArnott/fixNullHasher · neuecc/MessagePack-CSharp@f886840 · GitHub
Jump to