The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).
References
Configurations
History
21 Nov 2024, 08:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2240110 - Issue Tracking, Third Party Advisory | |
References | () https://bugzilla.suse.com/show_bug.cgi?id=1215563 - Issue Tracking, Third Party Advisory | |
References | () https://crates.io/crates/tungstenite/versions - Release Notes | |
References | () https://cwe.mitre.org/data/definitions/407.html - Technical Description | |
References | () https://github.com/advisories/GHSA-9mcr-873m-xcxp - Third Party Advisory | |
References | () https://github.com/github/advisory-database/pull/2752 - Patch | |
References | () https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2 - Patch | |
References | () https://github.com/snapview/tungstenite-rs/issues/376 - Exploit, Issue Tracking | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R77EUWPZVP5WSMNXUXUDNHR7G7OI5NGM/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THK6G6CD4VW6RCROWUV2C4HSINKK3XAK/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT7SF6CQ5VHAGFLWNXY64NFSW4WIWE7D/ - Mailing List, Third Party Advisory | |
References | () https://security-tracker.debian.org/tracker/CVE-2023-43669 - Third Party Advisory |
16 Feb 2024, 17:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R77EUWPZVP5WSMNXUXUDNHR7G7OI5NGM/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT7SF6CQ5VHAGFLWNXY64NFSW4WIWE7D/ - Mailing List, Third Party Advisory | |
References | (MISC) https://bugzilla.suse.com/show_bug.cgi?id=1215563 - Issue Tracking, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THK6G6CD4VW6RCROWUV2C4HSINKK3XAK/ - Mailing List, Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2240110 - Issue Tracking, Third Party Advisory | |
First Time |
Fedoraproject
Fedoraproject fedora |
|
CPE | cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
07 Nov 2023, 04:21
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
03 Oct 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Sep 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Sep 2023, 15:42
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:snapview:tungstenite:*:*:*:*:*:rust:*:* | |
First Time |
Snapview tungstenite
Snapview |
|
References | (MISC) https://security-tracker.debian.org/tracker/CVE-2023-43669 - Third Party Advisory | |
References | (MISC) https://bugzilla.suse.com/show_bug.cgi?id=1215563 - Third Party Advisory | |
References | (MISC) https://github.com/advisories/GHSA-9mcr-873m-xcxp - Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2240110 - Third Party Advisory | |
References | (MISC) https://github.com/github/advisory-database/pull/2752 - Patch | |
References | (MISC) https://cwe.mitre.org/data/definitions/407.html - Technical Description | |
References | (CONFIRM) https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2 - Patch | |
References | (MISC) https://crates.io/crates/tungstenite/versions - Release Notes | |
References | (MISC) https://github.com/snapview/tungstenite-rs/issues/376 - Exploit, Issue Tracking |
23 Sep 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes). |
21 Sep 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-21 06:15
Updated : 2024-11-21 08:24
NVD link : CVE-2023-43669
Mitre link : CVE-2023-43669
CVE.ORG link : CVE-2023-43669
JSON object : View
Products Affected
snapview
- tungstenite
fedoraproject
- fedora
CWE