Vulnerabilities > CVE-2023-43669
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).
Vulnerable Configurations
References
- https://github.com/snapview/tungstenite-rs/issues/376
- https://cwe.mitre.org/data/definitions/407.html
- https://crates.io/crates/tungstenite/versions
- https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2
- https://github.com/advisories/GHSA-9mcr-873m-xcxp
- https://bugzilla.suse.com/show_bug.cgi?id=1215563
- https://github.com/github/advisory-database/pull/2752
- https://bugzilla.redhat.com/show_bug.cgi?id=2240110
- https://security-tracker.debian.org/tracker/CVE-2023-43669
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THK6G6CD4VW6RCROWUV2C4HSINKK3XAK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT7SF6CQ5VHAGFLWNXY64NFSW4WIWE7D/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R77EUWPZVP5WSMNXUXUDNHR7G7OI5NGM/