BlackKite: Home
Menu

PUBLISHED DATE: May 30, 2025CVE-2020-36846:
Buffer Overflow Vulnerability

CVSS:
9.8
EPSS:
6.00%
Exploitability:
3.9
In KEV:
No
Description

A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library.  Versions of IO::Compress::Brotli prior to 0.007 included a version of the brotli library prior to version 1.0.8, where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your IO::Compress::Brotli module to 0.007 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

Questions to Ask Vendors
  1. Can you confirm whether your systems are affected by CVE-2020-36846, and if so, what steps are you currently taking to mitigate this vulnerability?
  2. What is your estimated timeline for fully resolving CVE-2020-36846 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
References

Ready to get results you can trust?