CVE-2020-15106

EUVD-2023-0749
In etcd before versions 3.3.23 and 3.4.10, a large slice causes panic in decodeRecord method. The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
GitHub_MCNA
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 35%
Affected Products (NVD)
VendorProductVersion
etcdetcd
𝑥
< 3.3.23
etcdetcd
3.4.0 ≤
𝑥
< 3.4.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
etcd
bookworm
3.4.23-4
fixed
bullseye
3.3.25+dfsg-6
fixed
buster
no-dsa
sid
3.5.16-3
fixed
trixie
3.5.15-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
etcd
bionic
Fixed 3.2.17+dfsg-1ubuntu0.1+esm1
released
focal
Fixed 3.2.26+dfsg-6ubuntu0.1
released
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needed
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needed
trusty
dne
xenial
needed