Denial of Service via Infinite Loop in Apache Avro Rust SDK <0.14.0
CVE-2022-35724 Published on August 9, 2022

Denial of service while reading data in Avro Rust SDK
It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.

NVD

Weakness Types

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Allocation of Resources Without Limits or Throttling

The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.


Products Associated with CVE-2022-35724

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-35724 are published in Apache Avro:

 

Affected Versions

Apache Software Foundation Apache Avro:

Exploit Probability

EPSS
0.70%
Percentile
71.62%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.