{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-3171","assignerOrgId":"14ed7db2-1595-443d-9d34-6215bf890778","assignerShortName":"Google","dateUpdated":"2025-04-21T13:47:57.569Z","dateReserved":"2022-09-09T00:00:00.000Z","datePublished":"2022-10-12T00:00:00.000Z"},"containers":{"cna":{"title":"Memory handling vulnerability in ProtocolBuffers Java core and lite","providerMetadata":{"orgId":"14ed7db2-1595-443d-9d34-6215bf890778","shortName":"Google","dateUpdated":"2023-04-27T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above."}],"affected":[{"vendor":"Google LLC","product":"Protocolbuffers","versions":[{"version":"3.21.7","status":"affected","lessThan":"3.21.7","versionType":"custom"},{"version":"3.20.3","status":"affected","lessThan":"3.20.3","versionType":"custom"},{"version":"3.19.6","status":"affected","lessThan":"3.19.6","versionType":"custom"},{"version":"3.16.3","status":"affected","lessThan":"3.16.3","versionType":"custom"}],"platforms":["core and lite"]}],"references":[{"url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2"},{"name":"FEDORA-2022-25f35ed634","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBAUKJQL6O4TIWYBENORSY5P43TVB4M3/"},{"name":"GLSA-202301-09","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202301-09"},{"name":"FEDORA-2022-15729fa33d","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP/"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","baseScore":4.3,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"INTERNAL"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:00:10.773Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2","tags":["x_transferred"]},{"name":"FEDORA-2022-25f35ed634","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBAUKJQL6O4TIWYBENORSY5P43TVB4M3/"},{"name":"GLSA-202301-09","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202301-09"},{"name":"FEDORA-2022-15729fa33d","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP/"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-21T13:36:41.564407Z","id":"CVE-2022-3171","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-21T13:47:57.569Z"}}]}}