#VU80874 Stack-based buffer overflow in Elasticsearch


Published: 2023-09-27 | Updated: 2023-10-07

Vulnerability identifier: #VU80874

Vulnerability risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2023-31419

CWE-ID: CWE-121

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Elasticsearch
Web applications / Other software

Vendor: Elastic Stack

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the _search API. A remote attacker can pass specially crafted data to the application, trigger a stack buffer overflow and perform a denial of service (DoS) attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Elasticsearch: 8.3.0 - 8.3.3, 8.2.0 - 8.2.3, 8.1.0 - 8.1.3, 8.0.0 - 8.0.1, 7.17.0 - 7.17.12, 7.16.0 - 7.16.3, 7.15.0 - 7.15.2, 7.14.0 - 7.14.2, 7.13.0 - 7.13.4, 7.12.0 - 7.12.1, 7.11.0 - 7.11.2, 7.10.0 - 7.10.2, 7.9.0 - 7.9.3, 7.8.0 - 7.8.1, 7.7.0 - 7.7.1, 7.6.0 - 7.6.2, 7.5.0 - 7.5.2, 7.4.0 - 7.4.2, 7.3.0 - 7.3.2, 7.2.0 - 7.2.1, 7.0.0 - 7.0.1, 7.1.0 - 7.1.1


External links
http://www.elastic.co/community/security#ESA-2023-14


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability