EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in OpenTelemetry eBPF Instrumentation (OBI) versions 0.7.0 through 0.8.9. The issues include a remotely reachable integer overflow in the memcached text protocol parser, which can crash the OBI process and cause denial of service. Additionally, malformed MongoDB and Postgres payloads can trigger uncaught panics in the respective parsers, allowing a remote unauthenticated attacker to crash the telemetry agent and cause a denial of service. The vulnerabilities affect business continuity and can lead to significant downtime and financial losses if exploited.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in OpenTelemetry eBPF Instrumentation (OBI) versions 0.7.0 through 0.8.9. The issues include a remotely reachable integer overflow in the memcached text protocol parser, which can crash the OBI process and cause denial of service. Additionally, malformed MongoDB and Postgres payloads can trigger uncaught panics in the respective parsers, allowing a remote unauthenticated attacker to crash the telemetry agent and cause a denial of service. The vulnerabilities affect business continuity and can lead to significant downtime and financial losses if exploited.[emaillocker id="1283"]
These vulnerabilities pose a significant risk to business continuity, as they can lead to prolonged downtime and financial losses if exploited. It is essential to prioritize patching and upgrading to the latest version of OBI (0.9.0) to mitigate these risks.
RECOMMENDATION:
REFERENCES:
The following reports contain further technical details:
https://github.com/advisories/GHSA-43g7-cwr8-q3jh
https://github.com/advisories/GHSA-j8p6-96vp-f3r9
https://github.com/advisories/GHSA-pgvv-q3wf-mm9m