
Cloud Vulnerability DB
A community-led vulnerabilities database
Java Facebook Thrift servers were found to be vulnerable to memory exhaustion due to improper validation of container sizes in messages. The vulnerability, identified as CVE-2019-11938, allowed servers to process messages declaring containers of sizes larger than the actual payload without proper error handling (NVD).
The vulnerability existed in the Java implementation of Facebook's Thrift protocol where the servers would not properly validate the size of containers against the remaining frame size before deserialization. This could lead to over-allocation of memory when processing malformed or truncated frames. The fix involved implementing size validation checks in both TBinaryProtocol and TCompactProtocol implementations, ensuring that there is enough data in the current frame before attempting deserialization (Facebook Commit).
The vulnerability could lead to memory exhaustion in Java Facebook Thrift servers, potentially resulting in denial of service conditions when processing maliciously crafted messages (NVD).
The vulnerability was patched through commits that implemented proper size validation checks. The fix ensures that the server validates the remaining frame size before attempting to deserialize containers and strings (Facebook Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."