Bug 1215564 - VUL-0: CVE-2023-43669: gstreamer-plugins-rs: tungstenite-rs embedded in gstreamer-plugin-rs has DoS via long HTTP request header
Summary: VUL-0: CVE-2023-43669: gstreamer-plugins-rs: tungstenite-rs embedded in gstre...
Status: NEW
Alias: None
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Antonio Larrosa
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/379560/
Whiteboard:
Keywords:
Depends on:
Blocks: CVE-2023-43669
  Show dependency treegraph
 
Reported: 2023-09-21 10:14 UTC by Cathy Hu
Modified: 2024-02-22 08:59 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---
stoyan.manolov: needinfo? (alarrosa)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Cathy Hu 2023-09-21 10:14:21 UTC
+++ This bug was initially created as a clone of Bug #1215563 +++

CVE-2023-43669

The Tungstenite crate through 0.20.0 for Rust allows remote attackers to cause a
denial of service (minutes of CPU consumption) via an excessive length of an
HTTP header in a client handshake. The length affects both how many times a
parse is attempted (e.g., thousands of times) and the average amount of data for
each parse attempt (e.g., millions of bytes).

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43669
https://www.cve.org/CVERecord?id=CVE-2023-43669
https://crates.io/crates/tungstenite/versions
https://cwe.mitre.org/data/definitions/407.html
https://github.com/snapview/tungstenite-rs/issues/376