mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-01-03 10:05:26 +01:00
Merge pull request #394 from gnunicorn/ben-ws-rs
Insufficient size checks in outgoing buffer in `ws` allows remote attacker to run the process out of memory
This commit is contained in:
21
crates/ws/RUSTSEC-0000-0000.toml
Normal file
21
crates/ws/RUSTSEC-0000-0000.toml
Normal file
@@ -0,0 +1,21 @@
|
||||
[advisory]
|
||||
id = "RUSTSEC-0000-0000"
|
||||
package = "ws"
|
||||
date = "2020-09-25"
|
||||
title = "Insufficient size checks in outgoing buffer in ws allows remote attacker to run the process out of memory"
|
||||
|
||||
url = "https://github.com/housleyjk/ws-rs/issues/291"
|
||||
|
||||
categories = ["denial-of-service"]
|
||||
keywords = ["websocket", "dos", "ddos","oom", "memory", "remotely"]
|
||||
|
||||
description = """
|
||||
Affected versions of this crate did not properly check and cap the growth of the outgoing buffer.
|
||||
|
||||
This allows a remote attacker to take down the process by growing the buffer of their (single) connection until the process runs out of memory it can allocate and is killed.
|
||||
|
||||
The flaw was corrected in the [`parity-ws` fork](https://crates.io/crates/parity-ws) (>0.10.0) by [disconnecting a client when the buffer runs full](https://github.com/housleyjk/ws-rs/pull/328).
|
||||
"""
|
||||
|
||||
[versions]
|
||||
patched = []
|
||||
Reference in New Issue
Block a user