High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2023-4785
HighVulnerability Description
Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Known Affected Software
112 configuration(s) from 1 vendor(s)
cpe:2.3:a:grpc:grpc:1.49.3:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.53.0:-:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.24.2:*:*:*:*:dart:*:*
cpe:2.3:a:grpc:grpc:1.31.2:*:*:*:*:dart:*:*
cpe:2.3:a:grpc:grpc:1.34.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.32.3:*:*:*:*:dart:*:*
cpe:2.3:a:grpc:grpc:1.26.1:*:*:*:*:dart:*:*
cpe:2.3:a:grpc:grpc:1.47.0:-:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.47.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.45.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.52.3:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.51.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.47.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.47.3:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.43.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.52.0:-:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.41.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.51.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.48.3:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.23.0:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.49.0:-:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.41.2:*:*:*:*:dart:*:*
cpe:2.3:a:grpc:grpc:1.50.0:-:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.45.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.28.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.37.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.34.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.36.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.24.3:*:*:*:*:*:*:*
cpe:2.3:a:grpc:grpc:1.51.0:-:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.29.0:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.27.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.49.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.46.4:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.35.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.54.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.56.0:-:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.32.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.34.2:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.36.3:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.44.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.48.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.32.2:*:*:*:*:dart:*:*
cpe:2.3:a:grpc:grpc:1.23.3:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.46.2:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.27.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.48.0:-:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.25.1:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.42.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.30.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.33.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.43.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.30.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.46.5:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.50.1:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.55.1:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.27.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.31.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.29.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.38.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.42.1:*:*:*:*:dart:*:*
cpe:2.3:a:grpc:grpc:1.46.0:-:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.41.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.42.2:*:*:*:*:dart:*:*
cpe:2.3:a:grpc:grpc:1.36.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.35.1:*:*:*:*:dart:*:*
cpe:2.3:a:grpc:grpc:1.30.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.39.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.44.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.24.1:*:*:*:*:*:*:*
cpe:2.3:a:grpc:grpc:1.54.1:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.37.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.36.4:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.45.0:-:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.25.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.32.1:*:*:*:*:dart:*:*
cpe:2.3:a:grpc:grpc:1.43.1:*:*:*:*:dart:*:*
cpe:2.3:a:grpc:grpc:1.47.4:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.28.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.53.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.46.3:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.36.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.33.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.52.1:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.48.4:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.26.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.23.4:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.27.3:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.50.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.49.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.33.3:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.46.6:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.33.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.38.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.24.4:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.51.3:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.55.0:-:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.46.1:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.45.3:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.52.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.24.0:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.54.0:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.40.2:*:*:*:*:dart:*:*
cpe:2.3:a:grpc:grpc:1.39.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.31.1:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.40.1:*:*:*:*:dart:*:*
cpe:2.3:a:grpc:grpc:1.46.7:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.48.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.23.1:*:*:*:*:go:*:*
cpe:2.3:a:grpc:grpc:1.28.2:*:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.40.0:-:*:*:*:-:*:*
cpe:2.3:a:grpc:grpc:1.47.5:*:*:*:*:-:*:*
2024-Jun-CVE-2023-4785
CVE-2023-4785: None
CPUJAN2025
Oracle Critical Patch Update Advisory - January 2025
References & Resources
-
https://github.com/grpc/grpc/pull/33656cve-coordination@google.com Issue Tracking Patch
-
https://github.com/grpc/grpc/pull/33667cve-coordination@google.com Issue Tracking
-
https://github.com/grpc/grpc/pull/33669cve-coordination@google.com Issue Tracking
-
https://github.com/grpc/grpc/pull/33670cve-coordination@google.com Issue Tracking
-
https://github.com/grpc/grpc/pull/33672cve-coordination@google.com Issue Tracking
-
https://github.com/grpc/grpc/pull/33656af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Patch
-
https://github.com/grpc/grpc/pull/33667af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://github.com/grpc/grpc/pull/33669af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://github.com/grpc/grpc/pull/33670af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://github.com/grpc/grpc/pull/33672af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
Severity Details
Weakness Type (CWE)
Uncaught Exception
- Description
- An exception is thrown from a function, but it is not caught.
- Typical Severity
- High
- Abstraction Level
- Base
Key Information
- Published Date
- September 13, 2023
