{"api_version":"1","generated_at":"2026-04-22T22:49:58+00:00","cve":"CVE-2023-39410","urls":{"html":"https://cve.report/CVE-2023-39410","api":"https://cve.report/api/cve/CVE-2023-39410.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-39410","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-39410"},"summary":{"title":"CVE-2023-39410","description":"When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system.\n\nThis issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2.  Users should update to apache-avro version 1.11.3 which addresses this issue.","state":"PUBLIC","assigner":"security@apache.org","published_at":"2023-09-29 17:15:00","updated_at":"2023-10-06 17:58:00"},"problem_types":["CWE-502"],"metrics":[],"references":[{"url":"https://lists.apache.org/thread/q142wj99cwdd0jo5lvdoxzoymlqyjdds","name":"https://lists.apache.org/thread/q142wj99cwdd0jo5lvdoxzoymlqyjdds","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.openwall.com/lists/oss-security/2023/09/29/6","name":"https://www.openwall.com/lists/oss-security/2023/09/29/6","refsource":"MISC","tags":[],"title":"oss-security - CVE-2023-39410: Apache Avro Java SDK: Memory when deserializing\n untrusted data in Avro Java SDK","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2023/09/29/6","name":"http://www.openwall.com/lists/oss-security/2023/09/29/6","refsource":"MISC","tags":[],"title":"oss-security - CVE-2023-39410: Apache Avro Java SDK: Memory when deserializing\n untrusted data in Avro Java SDK","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-39410","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39410","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"39410","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"avro","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"-","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-39410","qid":"242565","title":"Red Hat Update for JBoss Enterprise Application Platform 7.4.1 on RHEL 7 (RHSA-2023:7637)"},{"cve":"CVE-2023-39410","qid":"379452","title":"IBM Cognos Analytics Multiple Vulnerabilities (7123154)"},{"cve":"CVE-2023-39410","qid":"731169","title":"Atlassian Confluence Data Center and Server Security Update (CONFSERVER-94108)"},{"cve":"CVE-2023-39410","qid":"731306","title":"Atlassian Jira Software Data Center and Server Denial of Service (DoS) Vulnerability (JSWSERVER-25836)"},{"cve":"CVE-2023-39410","qid":"995479","title":"Java (Maven) Security Update for org.apache.avro:avro (GHSA-rhrv-645h-fjfh)"},{"cve":"CVE-2023-39410","qid":"995512","title":"Python (Pip) Security Update for avro (GHSA-rhrv-645h-fjfh)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-39410","ASSIGNER":"security@apache.org","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system.\n\nThis issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2.  Users should update to apache-avro version 1.11.3 which addresses this issue.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-502 Deserialization of Untrusted Data","cweId":"CWE-502"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apache Software Foundation","product":{"product_data":[{"product_name":"Apache Avro Java SDK","version":{"version_data":[{"version_affected":"<","version_name":"0","version_value":"1.11.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://lists.apache.org/thread/q142wj99cwdd0jo5lvdoxzoymlqyjdds","refsource":"MISC","name":"https://lists.apache.org/thread/q142wj99cwdd0jo5lvdoxzoymlqyjdds"},{"url":"https://www.openwall.com/lists/oss-security/2023/09/29/6","refsource":"MISC","name":"https://www.openwall.com/lists/oss-security/2023/09/29/6"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"defect":["AVRO-3819"],"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Adam Korczynski at ADA Logics Ltd"}]},"nvd":{"publishedDate":"2023-09-29 17:15:00","lastModifiedDate":"2023-10-06 17:58:00","problem_types":["CWE-502"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:avro:*:*:*:*:*:-:*:*","versionEndExcluding":"1.11.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}