SB2023072633 - Multiple vulnerabilities in Envoy
Published: July 26, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Improper Encoding or Escaping of Output (CVE-ID: CVE-2023-35941)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to improper encoding or escaping of output. A remote attacker can construct credentials with permanent validity.
2) Use-after-free (CVE-ID: CVE-2023-35942)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in the gRPC access logger extension. A remote user can perform a denial of service (DoS) attack.
3) Use-after-free (CVE-ID: CVE-2023-35943)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in the HTTP CORS filter. A remote user can perform a denial of service (DoS) attack.
4) Input validation error (CVE-ID: CVE-2023-35944)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to incorrect handling of requests and responses with mixed case schemes. A remote attacker can pass specially crafted input to the application and bypass some requests with mixed schemes.
Remediation
Install update from vendor's website.
References
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-69vr-g55c-v2v4
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-mc6h-6j9x-v3gq
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-pvgm-7jpg-pw5g