PeterO.Cbor versions 4.0.0 through 4.5.0 are vulnerable to a denial of
service vulnerability. An attacker may trigger the denial of service
condition by providing crafted data to the DecodeFromBytes or other
decoding mechanisms in PeterO.Cbor. Depending on the usage of the
library, an unauthenticated and remote attacker may be able to cause the
denial of service condition.
References
| Link | Resource |
|---|---|
| https://github.com/advisories/GHSA-6r92-cgxc-r5fg | Third Party Advisory |
| https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95 | Patch |
| https://github.com/peteroupc/CBOR/compare/v4.5...v4.5.1 | Release Notes |
| https://github.com/peteroupc/CBOR/security/advisories/GHSA-6r92-cgxc-r5fg | Third Party Advisory |
| https://vulncheck.com/advisories/vc-advisory-GHSA-6r92-cgxc-r5fg | Third Party Advisory |
| https://github.com/advisories/GHSA-6r92-cgxc-r5fg | Third Party Advisory |
| https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95 | Patch |
| https://github.com/peteroupc/CBOR/compare/v4.5...v4.5.1 | Release Notes |
| https://github.com/peteroupc/CBOR/security/advisories/GHSA-6r92-cgxc-r5fg | Third Party Advisory |
| https://vulncheck.com/advisories/vc-advisory-GHSA-6r92-cgxc-r5fg | Third Party Advisory |
Configurations
History
28 Nov 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) PeterO.Cbor versions 4.0.0 through 4.5.0 are vulnerable to a denial of service vulnerability. An attacker may trigger the denial of service condition by providing crafted data to the DecodeFromBytes or other decoding mechanisms in PeterO.Cbor. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial of service condition. |
Information
Published : 2024-01-03 16:15
Updated : 2025-11-28 23:15
NVD link : CVE-2024-21909
Mitre link : CVE-2024-21909
CVE.ORG link : CVE-2024-21909
JSON object : View
Products Affected
peteroupc
- cbor
CWE
CWE-407
Inefficient Algorithmic Complexity
