ALT-PU-2022-3041-1
Closed vulnerabilities
Published: 2022-04-12
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-32040
It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB Server v4.4 versions prior to and including 4.4.28, MongoDB Server v5.0 versions prior to 5.0.4 and MongoDB Server v4.2 versions prior to 4.2.16. Workaround: >= v4.2.16 users and all v4.4 users can add the --setParameter internalPipelineLengthLimit=50 instead of the default 1000 to mongod at startup to prevent a crash.
Severity: HIGH (7.5)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
- https://jira.mongodb.org/browse/SERVER-58203
- https://jira.mongodb.org/browse/SERVER-58203
- https://jira.mongodb.org/browse/SERVER-59299
- https://jira.mongodb.org/browse/SERVER-59299
- https://jira.mongodb.org/browse/SERVER-60218
- https://jira.mongodb.org/browse/SERVER-60218
- https://security.netapp.com/advisory/ntap-20220609-0005/
- https://security.netapp.com/advisory/ntap-20220609-0005/