漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
SpdyStream: DOS on CRI
Vulnerability Description
spdystream is a Go library for multiplexing streams over SPDY connections. In versions 0.5.0 and below, the SPDY/3 frame parser does not validate attacker-controlled counts and lengths before allocating memory. Three allocation paths are affected: the SETTINGS frame entry count, the header count in parseHeaderValueBlock, and individual header field sizes — all read as 32-bit integers and used directly as allocation sizes with no bounds checking. Because SPDY header blocks are zlib-compressed, a small on-the-wire payload can decompress into large attacker-controlled values. A remote peer that can send SPDY frames to a service using spdystream can exhaust process memory and cause an out-of-memory crash with a single crafted control frame. This issue has been fixed in version 0.5.1.
CVSS Information
N/A
Vulnerability Type
不加限制或调节的资源分配
Vulnerability Title
SpdyStream 安全漏洞
Vulnerability Description
SpdyStream是Moby开源的一个基于SPDY协议的多路复用流处理库。 SpdyStream 0.5.0及之前版本存在安全漏洞,该漏洞源于SPDY/3帧解析器在分配内存前未验证攻击者控制的计数和长度,可能导致远程攻击者通过特制控制帧耗尽进程内存并引发内存不足崩溃。
CVSS Information
N/A
Vulnerability Type
N/A