Lucene search

K
osvGoogleOSV:RUSTSEC-2022-0066
HistoryOct 30, 2022 - 12:00 p.m.

Denial of Service from unchecked request length

2022-10-3012:00:00
Google
osv.dev
1
denial of service
request length
`conduit-hyper`
version 0.4.2
internal limit
status 400
memory allocation

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

38.4%

Prior to version 0.4.2, conduit-hyper did not check any limit on a request’s
length before calling hyper::body::to_bytes. An attacker could send a
malicious request with an abnormally large Content-Length, which could lead
to a panic if memory allocation failed for that request.

In version 0.4.2, conduit-hyper sets an internal limit of 128 MiB per
request, otherwise returning status 400 (“Bad Request”).

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

38.4%

Related for OSV:RUSTSEC-2022-0066