VYPR
Moderate severityNVD Advisory· Published Jun 7, 2018· Updated Sep 16, 2024

CVE-2018-3738

CVE-2018-3738

Description

protobufjs is vulnerable to ReDoS when parsing crafted invalid .proto files.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Crafted .proto files cause ReDoS in protobufjs versions before 6.8.6 or 5.0.3 when parsing with a vulnerable regex.

Vulnerability

The vulnerability is a Regular Expression Denial of Service (ReDoS) in the protobufjs library, specifically within the parsing logic for .proto files. The issue resides in the parse.js file, where a crafted invalid .proto file can cause the regular expression to exhibit catastrophic backtracking [2]. Affected versions are those prior to 6.8.6 for the 6.x line and prior to 5.0.3 for the 5.x line [1][3].

Exploitation

An attacker can exploit this by providing a specially crafted invalid .proto file to the parser. No special network position or authentication is required if the parser processes untrusted input (e.g., via a web application that allows users to upload .proto files or a service that parses user-supplied protobuf definitions). The attacker's crafted input triggers the ReDoS, causing the parser to consume excessive CPU time.

Impact

Successful exploitation leads to a denial of service (DoS) condition, as the excessive CPU consumption can block the parsing thread, making the application unresponsive and potentially causing a crash or exhaustion of server resources. The confidentiality and integrity of data are not directly compromised [1][3].

Mitigation

The vulnerability has been patched in protobufjs versions 5.0.3 and 6.8.6 [3]. Users should upgrade to at least these versions. If immediate upgrade is not possible, avoid parsing untrusted .proto files with the affected library versions. The CVE is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog as of this writing.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
protobufjsnpm
>= 6.0.0, < 6.8.66.8.6
protobufjsnpm
< 5.0.35.0.3

Affected products

2
  • ghsa-coords
    Range: >= 6.0.0, < 6.8.6
  • HackerOne/protobufjs node modulev5
    Range: Versions up to and including 6.8.5

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.