{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T03:08:52.800","vulnerabilities":[{"cve":{"id":"CVE-2024-36129","sourceIdentifier":"security-advisories@github.com","published":"2024-06-05T18:15:10.833","lastModified":"2024-11-21T09:21:40.733","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The OpenTelemetry Collector offers a vendor-agnostic implementation on how to receive, process and export telemetry data. An unsafe decompression vulnerability allows unauthenticated attackers to crash the collector via excessive memory consumption. OTel Collector version 0.102.1 fixes this issue.  It is also fixed in the confighttp module version 0.102.0 and configgrpc module version 0.102.1.\n"},{"lang":"es","value":"OpenTelemetry Collector ofrece una implementación independiente del proveedor sobre cómo recibir, procesar y exportar datos de telemetría. Una vulnerabilidad de descompresión insegura permite a atacantes no autenticados bloquear el recopilador mediante un consumo excesivo de memoria. La versión 0.102.1 de OTel Collector soluciona este problema. También está corregido en la versión 0.102.0 del módulo confighttp y en la versión 0.102.1 del módulo configgrpc."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-119"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:opentelemetry:configgrpc:*:*:*:*:*:go:*:*","versionEndExcluding":"0.102.1","matchCriteriaId":"327CE873-41EC-401C-AF22-0A179C4A37D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:opentelemetry:confighttp:*:*:*:*:*:go:*:*","versionEndExcluding":"0.102.0","matchCriteriaId":"13F55EF7-B8F7-4344-BE0C-C8129E57A306"},{"vulnerable":true,"criteria":"cpe:2.3:a:opentelemetry:opentelemetry_collector:*:*:*:*:*:*:*:*","versionEndExcluding":"0.102.1","matchCriteriaId":"8F3C518A-75AF-4A34-83DF-9FCB346FE5EF"}]}]}],"references":[{"url":"https://github.com/open-telemetry/opentelemetry-collector/pull/10289","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/open-telemetry/opentelemetry-collector/pull/10323","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/open-telemetry/opentelemetry-collector/security/advisories/GHSA-c74f-6mfw-mm4v","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://opentelemetry.io/blog/2024/cve-2024-36129","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/open-telemetry/opentelemetry-collector/pull/10289","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/open-telemetry/opentelemetry-collector/pull/10323","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/open-telemetry/opentelemetry-collector/security/advisories/GHSA-c74f-6mfw-mm4v","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://opentelemetry.io/blog/2024/cve-2024-36129","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}