CVE-2021-41119

Wire-server is the system server for the wire back-end services. Releases prior to v2022-03-01 are subject to a denial of service attack via a crafted object causing a hash collision. This collision causes the server to spend at least quadratic time parsing it which can lead to a denial of service for a heavily used server. The issue has been fixed in wire-server 2022-03-01 and is already deployed on all Wire managed services. On premise instances of wire-server need to be updated to 2022-03-01, so that their backends are no longer affected. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wire:wire-server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:25

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 5.3
References () https://cs-syd.eu/posts/2021-09-11-json-vulnerability - Exploit, Third Party Advisory () https://cs-syd.eu/posts/2021-09-11-json-vulnerability - Exploit, Third Party Advisory
References () https://github.com/wireapp/wire-server/security/advisories/GHSA-phxv-pffh-fq2r - Third Party Advisory () https://github.com/wireapp/wire-server/security/advisories/GHSA-phxv-pffh-fq2r - Third Party Advisory

Information

Published : 2022-04-13 19:15

Updated : 2024-11-21 06:25


NVD link : CVE-2021-41119

Mitre link : CVE-2021-41119

CVE.ORG link : CVE-2021-41119


JSON object : View

Products Affected

wire

  • wire-server
CWE
CWE-400

Uncontrolled Resource Consumption