Description
Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation

This issue affects Apache Thrift: before 0.23.0.

Users are recommended to upgrade to version 0.23.0, which fixes the issue.
Published: 2026-04-28
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

This vulnerability is an integer overflow or wraparound in the Go implementation of Apache Thrift’s TFramedTransport. The flaw can cause the transport to incorrectly calculate frame lengths, potentially leading to memory corruption or application crashes. As a result, a malicious actor could disrupt service availability or achieve stronger attacks if additional vulnerabilities are present.

Affected Systems

The issue affects the Apache Thrift project distributed by the Apache Software Foundation, specifically all versions prior to 0.23.0 for the Go language implementation.

Risk and Exploitability

The exploitability of this flaw is not publicly documented and no exploit statistics are available. The EPSS score is less than 1%, and the CVSS score is 7.5, indicating a high severity. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves remote clients sending crafted frames to a Thrift server, but this is inferred rather than explicitly stated in the advisory.

Generated by OpenCVE AI on April 28, 2026 at 19:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache Thrift to version 0.23.0 or later.
  • Disable or restrict remote client connections that could send malformed frames until the patch is applied.
  • Monitor server logs for anomalies in frame length and implement input validation to reject oversized frames.

Generated by OpenCVE AI on April 28, 2026 at 19:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:thrift:*:*:*:*:*:*:*:*

Tue, 28 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache thrift
Vendors & Products Apache
Apache thrift

Tue, 28 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
References

Tue, 28 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Description Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation This issue affects Apache Thrift: before 0.23.0. Users are recommended to upgrade to version 0.23.0, which fixes the issue.
Title Apache Thrift: Go TFramedTransport uint32 overflow
Weaknesses CWE-190
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-28T14:10:24.945Z

Reserved: 2026-04-21T21:28:29.894Z

Link: CVE-2026-41602

cve-icon Vulnrichment

Updated: 2026-04-28T09:51:57.579Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-28T10:16:03.000

Modified: 2026-04-28T18:40:25.530

Link: CVE-2026-41602

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:30:27Z

Weaknesses