When reading binary Ion data through Amazon.IonDotnet using the RawBinaryReader class, Amazon.IonDotnet does not check the number of bytes read from the underlying stream while deserializing the binary format. If the Ion data is malformed or truncated, this triggers an infinite loop condition that could potentially result in a denial of service. Users should upgrade to Amazon.IonDotnet version 1.3.1 and ensure any forked or derivative code is patched to incorporate the new fixes.
History

Mon, 21 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 21 Apr 2025 15:45:00 +0000


Mon, 21 Apr 2025 15:30:00 +0000

Type Values Removed Values Added
Description When reading binary Ion data through Amazon.IonDotnet using the RawBinaryReader class, Amazon.IonDotnet does not check the number of bytes read from the underlying stream while deserializing the binary format. If the Ion data is malformed or truncated, this triggers an infinite loop condition that could potentially result in a denial of service. Users should upgrade to Amazon.IonDotnet version 1.3.1 and ensure any forked or derivative code is patched to incorporate the new fixes.
Title Infinite loop condition in Amazon.IonDotnet
Weaknesses CWE-502
CWE-835
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published: 2025-04-21T15:13:51.905Z

Updated: 2025-04-21T15:41:48.859Z

Reserved: 2025-04-21T14:59:29.846Z

Link: CVE-2025-3857

cve-icon Vulnrichment

Updated: 2025-04-21T15:35:51.168Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-21T16:15:54.907

Modified: 2025-04-23T14:08:13.383

Link: CVE-2025-3857

cve-icon Redhat

No data.