[ 
https://issues.apache.org/jira/browse/THRIFT-5237?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17414094#comment-17414094
 ] 

Antoine Pitrou commented on THRIFT-5237:
----------------------------------------

Sorry to comment on this issue, but has some analysis of the vulnerability be 
posted somewhere? In Parquet C++ people have encountered real-world situations 
where the new message size would prevent from reading legitimate data (see 
ARROW-13655). Our initial intuition is to simply disable the max message size 
limit (by bumping it to the max allowable value), but it is not clear what the 
consequences are. In particular, the CVE-2020-13949 description says:
{quote}In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short 
messages which would result in a large memory allocation, potentially leading 
to denial of service.{quote}

... which is extremely vague (why would a short message result in a large 
memory allocation? What is the involved mechanism?).

 

> Implement MAX_MESSAGE_SIZE and consolidate limits into a TConfiguration class
> -----------------------------------------------------------------------------
>
>                 Key: THRIFT-5237
>                 URL: https://issues.apache.org/jira/browse/THRIFT-5237
>             Project: Thrift
>          Issue Type: Improvement
>          Components: C glib - Library, C++ - Library, Java - Library
>            Reporter: Zezeng Wang
>            Assignee: Zezeng Wang
>            Priority: Major
>             Fix For: 0.14.0
>
>          Time Spent: 7.5h
>  Remaining Estimate: 0h
>
> This ticket has two related goals:
> a) to implement a new limit for the maximum message size similar to max 
> frames size etc
> b) consolidate and centralize all limits we have (max msg size,. max frame 
> size and max recursion depth) into one place in the code



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to