Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.
[
{
"source": "https://github.com/grpc/grpc-java/commit/958205ddb1ab7ec1f5bb92a1a812cf30fa753c36",
"id": "CVE-2023-4785-f337f5d8",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "core/src/main/java/io/grpc/internal/GrpcUtil.java"
},
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"148529735852666896963464408479363428299",
"317277031500261825959216832225781396438",
"121902372659488140859240128980598754188",
"234477324359876819246199200915366156403"
]
}
}
]