CVE-2019-20925
Published: 24 November 2020
An unauthenticated client can trigger denial of service by issuing specially crafted wire protocol messages, which cause the message decompressor to incorrectly allocate memory. This issue affects: MongoDB Inc. MongoDB Server v4.2 versions prior to 4.2.1; v4.0 versions prior to 4.0.13; v3.6 versions prior to 3.6.15; v3.4 versions prior to 3.4.24.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
mongodb Launchpad, Ubuntu, Debian |
bionic |
Released
(1:3.6.3-0ubuntu1.4)
|
focal |
Released
(1:3.6.9+really3.6.8+90~g8e540c0b6d-0ubuntu5.3)
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
precise |
Does not exist
|
|
trusty |
Needs triage
|
|
upstream |
Released
(3.6.15, 4.0.13, 4.2.1, 4.3.1, 3.4.24)
|
|
xenial |
Not vulnerable
(code not present)
|
Notes
Author | Note |
---|---|
msalvatore | Introduced by https://github.com/mongodb/mongo/commit/91800fc61913358350b658406065c5d893d2ba2c |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20925
- https://jira.mongodb.org/browse/SERVER-43751
- https://ubuntu.com/security/notices/USN-5101-1
- NVD
- Launchpad
- Debian