Логотип exploitDog
bind:CVE-2022-3252
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-3252

Количество 2

Количество 2

nvd логотип

CVE-2022-3252

больше 3 лет назад

Improper detection of complete HTTP body decompression SwiftNIO Extras provides a pair of helpers for transparently decompressing received HTTP request or response bodies. These two objects (HTTPRequestDecompressor and HTTPResponseDecompressor) both failed to detect when the decompressed body was considered complete. If trailing junk data was appended to the HTTP message body, the code would repeatedly attempt to decompress this data and fail. This would lead to an infinite loop making no forward progress, leading to livelock of the system and denial-of-service. This issue can be triggered by any attacker capable of sending a compressed HTTP message. Most commonly this is HTTP servers, as compressed HTTP messages cannot be negotiated for HTTP requests, but it is possible that users have configured decompression for HTTP requests as well. The attack is low effort, and likely to be reached without requiring any privilege or system access. The impact on availability is high: the process i

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-773g-x274-8qmf

больше 2 лет назад

SwiftNIO Extras vulnerable to improper detection of complete HTTP body decompression

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-3252

Improper detection of complete HTTP body decompression SwiftNIO Extras provides a pair of helpers for transparently decompressing received HTTP request or response bodies. These two objects (HTTPRequestDecompressor and HTTPResponseDecompressor) both failed to detect when the decompressed body was considered complete. If trailing junk data was appended to the HTTP message body, the code would repeatedly attempt to decompress this data and fail. This would lead to an infinite loop making no forward progress, leading to livelock of the system and denial-of-service. This issue can be triggered by any attacker capable of sending a compressed HTTP message. Most commonly this is HTTP servers, as compressed HTTP messages cannot be negotiated for HTTP requests, but it is possible that users have configured decompression for HTTP requests as well. The attack is low effort, and likely to be reached without requiring any privilege or system access. The impact on availability is high: the process i

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-773g-x274-8qmf

SwiftNIO Extras vulnerable to improper detection of complete HTTP body decompression

CVSS3: 7.5
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу