Vulnerability Details : CVE-2023-23625
go-unixfs is an implementation of a unix-like filesystem on top of an ipld merkledag. Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by bogus `fanout` parameter in the HAMT directory nodes. Users are advised to upgrade to version 0.4.3 to resolve this issue. Users unable to upgrade should not feed untrusted user data to the decoding functions.
Products affected by CVE-2023-23625
- cpe:2.3:a:protocol:go-unixfs:*:*:*:*:*:go:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-23625
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-23625
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.2
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2023-23625
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-23625
-
https://github.com/ipfs/go-unixfs/commit/467d139a640ecee4f2e74643dafcc58bb3b54175
Merge pull request from GHSA-q264-w97q-q778 · ipfs/go-unixfs@467d139 · GitHubPatch
-
https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778
DOS HAMT Decoding Panics · Advisory · ipfs/go-unixfs · GitHubVendor Advisory
Jump to