First published: Thu Sep 21 2023(Updated: )
The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Snapview Tungstenite | <=0.20.0 | |
rust/tungstenite | <=0.20.0 | 0.20.1 |
debian/rust-tungstenite | 0.24.0-3 | |
Fedora | =37 | |
Fedora | =38 | |
Fedora | =39 | |
snapview Tungstenite Rust | <=0.20.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43669 is a vulnerability in the Tungstenite crate for Rust that allows remote attackers to cause a denial of service by consuming excessive CPU resources.
CVE-2023-43669 affects the Tungstenite crate through version 0.20.0 and allows remote attackers to cause a denial of service through an excessive length of an HTTP header in a client handshake.
CVE-2023-43669 has a severity level of medium.
To fix CVE-2023-43669, update the Tungstenite crate to version 0.20.1 or later.
You can find more information about CVE-2023-43669 in the NIST National Vulnerability Database (NVD) at https://nvd.nist.gov/vuln/detail/CVE-2023-43669.