Bug 1215563 (CVE-2023-43669)

Summary: VUL-0: CVE-2023-43669: TRACKERBUG: tungstenite-rs: DoS with long HTTP request header
Product: [Novell Products] SUSE Security Incidents Reporter: Cathy Hu <cathy.hu>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: security-team
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/379560/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-43669:7.5:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on: 1215564, 1215566    
Bug Blocks:    

Description Cathy Hu 2023-09-21 10:11:18 UTC
CVE-2023-43669

The Tungstenite crate through 0.20.0 for Rust allows remote attackers to cause a
denial of service (minutes of CPU consumption) via an excessive length of an
HTTP header in a client handshake. The length affects both how many times a
parse is attempted (e.g., thousands of times) and the average amount of data for
each parse attempt (e.g., millions of bytes).

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43669
https://www.cve.org/CVERecord?id=CVE-2023-43669
https://crates.io/crates/tungstenite/versions
https://cwe.mitre.org/data/definitions/407.html
https://github.com/snapview/tungstenite-rs/issues/376
Comment 1 Cathy Hu 2023-09-21 10:12:39 UTC
This is an embedded code trackerbug for the security team, please check out the subbugs for the packages that embed this crate