6.5
CVSSv3

CVE-2020-15106

Published: 05/08/2020 Updated: 07/11/2023
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Summary

In etcd prior to 3.3.23 and 3.4.10, a large slice causes panic in decodeRecord method. The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

etcd etcd

fedoraproject fedora 32

Vendor Advisories

Debian Bug report logs - #968740 CVE-2020-15106 CVE-2020-15112 CVE-2020-15113 CVE-2020-15114 CVE-2020-15115 Package: etcd; Maintainer for etcd is Debian Go Packaging Team <team+pkg-go@trackerdebianorg>; Source for etcd is src:etcd (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Thu, 20 ...
Several security issues were fixed in etcd ...