First published: Tue Jun 26 2018(Updated: )
aaugustin websockets version 4 contains a CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) vulnerability in Servers and clients, unless configured with compression=None that can result in Denial of Service by memory exhaustion. This attack appear to be exploitable via Sending a specially crafted frame on an established connection. This vulnerability appears to have been fixed in 5.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/websockets | >=4.0<5.0 | 5.0 |
Websockets Project Websockets Python | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-1000518.
The severity of CVE-2018-1000518 is high with a severity value of 7.5.
The affected software is the Python websockets library version 4 and Websockets Project Websockets 4.0.
This vulnerability can be exploited to cause a Denial of Service by memory exhaustion.
Yes, a fix is available with the remedy version 5.0 for the Python websockets library.