An issue was discovered in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a long message in a TCP request that leads to std::length_error.
[
{
"signature_version": "v1",
"source": "https://github.com/drachtio/drachtio-server/commit/4cf9fe2c420b86c16442215d449d40be777c1911",
"deprecated": false,
"digest": {
"length": 425.0,
"function_hash": "338788714758937886263339513865520355624"
},
"signature_type": "Function",
"id": "CVE-2022-47515-1377159f",
"target": {
"function": "StackMsg::appendLine",
"file": "src/controller.cpp"
}
},
{
"signature_version": "v1",
"source": "https://github.com/drachtio/drachtio-server/commit/4cf9fe2c420b86c16442215d449d40be777c1911",
"deprecated": false,
"digest": {
"line_hashes": [
"299243454865204980742119381410495309520",
"36498908285816985529616062427686011515",
"227731893922689886423195514951356434374",
"160509003657223647173879821285524496135"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2022-47515-5b17a01d",
"target": {
"file": "src/controller.cpp"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-47515.json"