Skip to content

Commit 0d63726

Browse files
1 parent db4cf93 commit 0d63726

File tree

1 file changed

+78
-0
lines changed

1 file changed

+78
-0
lines changed
Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-q5r6-9qwq-g2wj",
4+
"modified": "2025-10-09T22:15:57Z",
5+
"published": "2025-10-09T22:15:57Z",
6+
"aliases": [
7+
"CVE-2025-11573"
8+
],
9+
"summary": "Amazon.IonDotnet is vulnerable to Denial of Service attacks",
10+
"details": "### Summary\nAmazon.IonDotnet is a library for the Dotnet language that is used to read and write Amazon Ion data. An issue exists where, under certain circumstances, the library could an infinite loop, resulting in denial of service. As of August 20, 2025, this library has been deprecated and will not receive further updates.\n\n### Impact\nAn infinite loop issue in Amazon.IonDotnet library versions <v1.3.2 may allow a threat actor to cause a denial of service through a specially crafted text input. This invalid input triggered an error condition in the parser that was handled improperly, resulting in an infinite loop.\n\n### Impacted versions:\n<1.3.2\n\n### Patches\nThis issue has been addressed in Amazon.IonDotnet version [1.3.2](https://www.nuget.org/packages/Amazon.IonDotnet/1.3.2). We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes.\n\n### Workarounds\nOnly accept data from trusted sources, written using a supported Ion library.\n\n### References\nIf you have any questions or comments about this advisory, we ask that you contact AWS Security via our [vulnerability reporting page](https://aws.amazon.com/security/vulnerability-reporting) or directly via email to [aws-security@amazon.com](mailto:aws-security@amazon.com). Please do not create a public GitHub issue.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "NuGet",
21+
"name": "Amazon.IonDotnet"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.3.2"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/amazon-ion/ion-dotnet/security/advisories/GHSA-q5r6-9qwq-g2wj"
42+
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11573"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/amazon-ion/ion-dotnet/pull/160"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/amazon-ion/ion-dotnet/commit/edaff75fe5abbb71e647bed812c608c0c5e2fbab"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2025-022"
58+
},
59+
{
60+
"type": "PACKAGE",
61+
"url": "https://github.com/amazon-ion/ion-dotnet"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://github.com/amazon-ion/ion-dotnet/releases/tag/v1.3.2"
66+
}
67+
],
68+
"database_specific": {
69+
"cwe_ids": [
70+
"CWE-1286",
71+
"CWE-400"
72+
],
73+
"severity": "HIGH",
74+
"github_reviewed": true,
75+
"github_reviewed_at": "2025-10-09T22:15:57Z",
76+
"nvd_published_at": "2025-10-09T18:15:49Z"
77+
}
78+
}

0 commit comments

Comments
 (0)