CVE-2021-43045: Allocation of Resources Without Limits or Throttling in Apache Avro
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.67305%
CWE
Published
1/8/2022
Updated
9/26/2023
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Apache.Avro | nuget | < 1.11.0 | 1.11.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unvalidated length values in string deserialization. The GitHub PR #1357 shows the fix added length validation checks in BinaryDecoder.ReadString()
, and JIRA tickets AVRO-3225/AVRO-3226 explicitly reference these issues in the .NET implementation. The pre-patch code used unchecked 'ReadInt()' results for memory allocations, making it vulnerable to malicious payloads with invalid length values.