Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.
{ "vanir_signatures": [ { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "148529735852666896963464408479363428299", "317277031500261825959216832225781396438", "121902372659488140859240128980598754188", "234477324359876819246199200915366156403" ] }, "source": "https://github.com/grpc/grpc-java/commit/958205ddb1ab7ec1f5bb92a1a812cf30fa753c36", "deprecated": false, "target": { "file": "core/src/main/java/io/grpc/internal/GrpcUtil.java" }, "signature_type": "Line", "id": "CVE-2023-4785-f337f5d8" } ] }