CVE-2020-27217 – org.eclipse.hono:hono-core
Package
Manager: maven
Name: org.eclipse.hono:hono-core
Vulnerable Version: >=0 <=1.4.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00325 pctl0.54897
Details
Improper Validation of Specified Quantity in Input in Eclipse Hono In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly disallows a peer to send such messages, a hand crafted AMQP 1.0 client could exploit this behavior in order to send a message of unlimited size to the adapter, eventually causing the adapter to fail with an out of memory exception.
Metadata
Created: 2022-02-10T20:22:06Z
Modified: 2021-04-19T23:18:06Z
Source: MANUAL
CWE IDs: ["CWE-1284"]
Alternative ID: GHSA-9f52-hpvw-v96w
Finding: F184
Auto approve: 1