CVE-2020-8927 (CNNVD-202009-910)

MEDIUM
中文标题:
Google brotli Library 缓冲区错误漏洞
英文标题:
Buffer overflow in Brotli library
CVSS分数: 5.3
发布时间: 2020-09-15 09:15:12
漏洞类型: 缓冲区错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Google brotli Library是美国谷歌(Google)公司的一种数据压缩算法的扩展库使用 LZ77 算法、赫夫曼编码和二阶上下文建模的现代变体组合来压缩数据,其压缩比可与目前可用的最佳通用压缩方法相媲美。 Google brotli Library 1.0.8之前版本存在缓冲区错误漏洞,攻击者控制脚本的一次性解压缩请求的输入长度可能会触发崩溃。

英文描述:

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

CWE类型:
CWE-130 CWE-120
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Google LLC Brotli - ≤ 1.0.7 - cpe:2.3:a:google_llc:brotli:*:*:*:*:*:*:*:*
google brotli * - - cpe:2.3:a:google:brotli:*:*:*:*:*:*:*:*
debian debian_linux 9.0 - - cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
debian debian_linux 10.0 - - cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
fedoraproject fedora 31 - - cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
fedoraproject fedora 32 - - cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
fedoraproject fedora 33 - - cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
fedoraproject fedora 34 - - cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
fedoraproject fedora 35 - - cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
fedoraproject fedora 36 - - cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
canonical ubuntu_linux 16.04 - - cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
canonical ubuntu_linux 18.04 - - cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
canonical ubuntu_linux 20.04 - - cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
opensuse leap 15.2 - - cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
microsoft .net * - - cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
microsoft .net_core * - - cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*
microsoft powershell * - - cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*
microsoft visual_studio_2019 * - - cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*
microsoft visual_studio_2022 * - - cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
microsoft visual_studio_2022 17.1 - - cpe:2.3:a:microsoft:visual_studio_2022:17.1:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_CONFIRM
cve.org
访问
openSUSE-SU-2020:1578 vendor-advisory
cve.org
访问
FEDORA-2020-22d278923a vendor-advisory
cve.org
访问
USN-4568-1 vendor-advisory
cve.org
访问
FEDORA-2020-c663fbc46c vendor-advisory
cve.org
访问
FEDORA-2020-e21bd401ad vendor-advisory
cve.org
访问
FEDORA-2020-bc9a739f0c vendor-advisory
cve.org
访问
FEDORA-2020-9336b65f82 vendor-advisory
cve.org
访问
FEDORA-2020-c76a35b209 vendor-advisory
cve.org
访问
[debian-lts-announce] 20201201 [SECURITY] [DLA 2476-1] brotli security update mailing-list
cve.org
访问
DSA-4801 vendor-advisory
cve.org
访问
FEDORA-2022-9e046f579a vendor-advisory
cve.org
访问
FEDORA-2022-5ecee47acb vendor-advisory
cve.org
访问
FEDORA-2022-d28042f559 vendor-advisory
cve.org
访问
CVSS评分详情
3.1 (cna)
MEDIUM
5.3
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
机密性
NONE
完整性
LOW
可用性
NONE
时间信息
发布时间:
2020-09-15 09:15:12
修改时间:
2024-08-04 10:12:11
创建时间:
2025-11-11 15:36:29
更新时间:
2025-11-11 15:56:27
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2020-8927 2025-11-11 15:20:43 2025-11-11 07:36:29
NVD nvd_CVE-2020-8927 2025-11-11 14:57:03 2025-11-11 07:44:52
CNNVD cnnvd_CNNVD-202009-910 2025-11-11 15:10:30 2025-11-11 07:56:27
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:56:27
vulnerability_type: 未提取 → 缓冲区错误; cnnvd_id: 未提取 → CNNVD-202009-910; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 缓冲区错误
  • cnnvd_id: 未提取 -> CNNVD-202009-910
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:44:52
affected_products_count: 1 → 20; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 1 -> 20
  • data_sources: ['cve'] -> ['cve', 'nvd']