Amazon Linux AMI update for grpc



Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2023-32731
CVE-2023-32732
CVE-2023-4785
CWE-ID CWE-20
CWE-400
Exploitation vector Network
Public exploit N/A
Vulnerable software
Amazon Linux AMI
Operating systems & Components / Operating system

grpc
Operating systems & Components / Operating system package or component

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU79797

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-32731

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input when parsing HTTP2 requests. When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. This could lead to requests from the proxy being interpreted as containing headers from different proxy clients, leading to an information leak that can be used for privilege escalation or data exfiltration.

Mitigation

Update the affected packages:

aarch64:
    grpc-cpp-debuginfo-1.56.2-10.amzn2023.aarch64
    grpc-debuginfo-1.56.2-10.amzn2023.aarch64
    grpc-plugins-1.56.2-10.amzn2023.aarch64
    grpc-plugins-debuginfo-1.56.2-10.amzn2023.aarch64
    grpc-1.56.2-10.amzn2023.aarch64
    grpc-cpp-1.56.2-10.amzn2023.aarch64
    grpc-devel-1.56.2-10.amzn2023.aarch64
    grpc-debugsource-1.56.2-10.amzn2023.aarch64

noarch:
    grpc-data-1.56.2-10.amzn2023.noarch
    grpc-doc-1.56.2-10.amzn2023.noarch

src:
    grpc-1.56.2-10.amzn2023.src

x86_64:
    grpc-debuginfo-1.56.2-10.amzn2023.x86_64
    grpc-plugins-debuginfo-1.56.2-10.amzn2023.x86_64
    grpc-cpp-debuginfo-1.56.2-10.amzn2023.x86_64
    grpc-plugins-1.56.2-10.amzn2023.x86_64
    grpc-1.56.2-10.amzn2023.x86_64
    grpc-cpp-1.56.2-10.amzn2023.x86_64
    grpc-devel-1.56.2-10.amzn2023.x86_64
    grpc-debugsource-1.56.2-10.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

grpc: All versions

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-282.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU79796

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-32732

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application and cause a termination of connection between a HTTP2 proxy and a gRPC server.

Mitigation

Update the affected packages:

aarch64:
    grpc-cpp-debuginfo-1.56.2-10.amzn2023.aarch64
    grpc-debuginfo-1.56.2-10.amzn2023.aarch64
    grpc-plugins-1.56.2-10.amzn2023.aarch64
    grpc-plugins-debuginfo-1.56.2-10.amzn2023.aarch64
    grpc-1.56.2-10.amzn2023.aarch64
    grpc-cpp-1.56.2-10.amzn2023.aarch64
    grpc-devel-1.56.2-10.amzn2023.aarch64
    grpc-debugsource-1.56.2-10.amzn2023.aarch64

noarch:
    grpc-data-1.56.2-10.amzn2023.noarch
    grpc-doc-1.56.2-10.amzn2023.noarch

src:
    grpc-1.56.2-10.amzn2023.src

x86_64:
    grpc-debuginfo-1.56.2-10.amzn2023.x86_64
    grpc-plugins-debuginfo-1.56.2-10.amzn2023.x86_64
    grpc-cpp-debuginfo-1.56.2-10.amzn2023.x86_64
    grpc-plugins-1.56.2-10.amzn2023.x86_64
    grpc-1.56.2-10.amzn2023.x86_64
    grpc-cpp-1.56.2-10.amzn2023.x86_64
    grpc-devel-1.56.2-10.amzn2023.x86_64
    grpc-debugsource-1.56.2-10.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

grpc: All versions

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-282.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Resource exhaustion

EUVDB-ID: #VU82653

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-4785

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to lack of error handling in the TCP server in Google's gRPC. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack by initiating a significant number of connections with the server.

Mitigation

Update the affected packages:

aarch64:
    grpc-cpp-debuginfo-1.56.2-10.amzn2023.aarch64
    grpc-debuginfo-1.56.2-10.amzn2023.aarch64
    grpc-plugins-1.56.2-10.amzn2023.aarch64
    grpc-plugins-debuginfo-1.56.2-10.amzn2023.aarch64
    grpc-1.56.2-10.amzn2023.aarch64
    grpc-cpp-1.56.2-10.amzn2023.aarch64
    grpc-devel-1.56.2-10.amzn2023.aarch64
    grpc-debugsource-1.56.2-10.amzn2023.aarch64

noarch:
    grpc-data-1.56.2-10.amzn2023.noarch
    grpc-doc-1.56.2-10.amzn2023.noarch

src:
    grpc-1.56.2-10.amzn2023.src

x86_64:
    grpc-debuginfo-1.56.2-10.amzn2023.x86_64
    grpc-plugins-debuginfo-1.56.2-10.amzn2023.x86_64
    grpc-cpp-debuginfo-1.56.2-10.amzn2023.x86_64
    grpc-plugins-1.56.2-10.amzn2023.x86_64
    grpc-1.56.2-10.amzn2023.x86_64
    grpc-cpp-1.56.2-10.amzn2023.x86_64
    grpc-devel-1.56.2-10.amzn2023.x86_64
    grpc-debugsource-1.56.2-10.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

grpc: All versions

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-282.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###