Google gRPC is prone to a heap-based buffer overflow vulnerability.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely cause a denial-of-service condition.
Information
References:
- Google Homepage (Google)
- Introducing gRPC, a new open source HTTP/2 RPC Framework (GoogleBlog)
- Fixed Heap-buffer-overflow in parse_unix via clusterfuzz #9833 (Github)
- grpc: Heap-buffer-overflow in parse_unix (Chromium)