Description
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) (RFC 8949) serialization format. Starting in version 5.5.1 and prior to version 5.6.2, an attacker can crash a service using cbor2 to parse a CBOR binary by sending a long enough object. Version 5.6.2 contains a patch for this issue.
References (8)
Core 8
Core References
Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/BT42VXZMMMCSSHMA65KKPOZCXJEYHNR5/
Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/GX524ZG2XJWFV37UQKQ4LWIH4UICSGEQ/
Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/PWC3VU6YV6EXKCSX5GTKWLBZIDIJNQJY/
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/agronholm/cbor2/security/advisories/GHSA-375g-39jq-vq7m
Issue Tracking x_refsource_misc
https://github.com/agronholm/cbor2/pull/204
Product x_refsource_misc
https://github.com/agronholm/cbor2/commit/387755eacf0be35591a478d3c67fe10618a6d542
Patch x_refsource_misc
https://github.com/agronholm/cbor2/commit/4de6991ba29bf2290d7b9d83525eda7d021873df
Release Notes x_refsource_misc
https://github.com/agronholm/cbor2/releases/tag/5.6.2
Scores
CVSS v3
7.5
EPSS
0.0109
EPSS Percentile
78.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-120
Status
published
Products (5)
agronholm/cbor2
5.5.1 - 5.6.2
fedoraproject/fedora
38
fedoraproject/fedora
39
fedoraproject/fedora
40
pypi/cbor2
5.5.1 - 5.6.2PyPI
Published
Feb 19, 2024
Tracked Since
Feb 18, 2026