{"vulnerability": "CVE-2023-43642", "sightings": [{"uuid": "81ce46c8-276a-4d4c-bb3e-b4527486f144", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43642", "type": "seen", "source": "https://t.me/ctinow/181980", "content": "https://ift.tt/gPdAkTm\nCVE-2023-43642 | Oracle Business Intelligence Enterprise Edition 7.0.0.0.0 Visual Analyzer denial of service", "creation_timestamp": "2024-02-09T12:21:16.000000Z"}, {"uuid": "ada63eec-c19a-49d3-a3f4-09afc07d4756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43642", "type": "seen", "source": "https://t.me/cibsecurity/71016", "content": "\u203c CVE-2023-43642 \u203c\n\nsnappy-java is a Java port of the snappy, a fast C++ compresser/decompresser developed by Google. The SnappyInputStream was found to be vulnerable to Denial of Service (DoS) attacks when decompressing data with a too large chunk size. Due to missing upper bound check on chunk length, an unrecoverable fatal error can occur. All versions of snappy-java including the latest released version 1.1.10.3 are vulnerable to this issue. A fix has been introduced in commit `9f8c3cf74` which will be included in the 1.1.10.4 release. Users are advised to upgrade. Users unable to upgrade should only accept compressed data from trusted sources.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-26T00:34:29.000000Z"}]}