CVE-2023-43669

The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).
Configurations

Configuration 1 (hide)

cpe:2.3:a:snapview:tungstenite:*:*:*:*:*:rust:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

16 Feb 2024, 17:56

Type Values Removed Values Added
First Time Fedoraproject
Fedoraproject fedora
References () https://bugzilla.redhat.com/show_bug.cgi?id=2240110 - Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2240110 - Issue Tracking, Third Party Advisory
References () https://bugzilla.suse.com/show_bug.cgi?id=1215563 - Third Party Advisory () https://bugzilla.suse.com/show_bug.cgi?id=1215563 - Issue Tracking, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R77EUWPZVP5WSMNXUXUDNHR7G7OI5NGM/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R77EUWPZVP5WSMNXUXUDNHR7G7OI5NGM/ - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THK6G6CD4VW6RCROWUV2C4HSINKK3XAK/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THK6G6CD4VW6RCROWUV2C4HSINKK3XAK/ - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT7SF6CQ5VHAGFLWNXY64NFSW4WIWE7D/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT7SF6CQ5VHAGFLWNXY64NFSW4WIWE7D/ - Mailing List, Third Party Advisory
CPE cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

07 Nov 2023, 04:21

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TT7SF6CQ5VHAGFLWNXY64NFSW4WIWE7D/', 'name': 'FEDORA-2023-e72bf7b92e', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R77EUWPZVP5WSMNXUXUDNHR7G7OI5NGM/', 'name': 'FEDORA-2023-9c4142423a', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/THK6G6CD4VW6RCROWUV2C4HSINKK3XAK/', 'name': 'FEDORA-2023-91a66898d2', 'tags': [], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT7SF6CQ5VHAGFLWNXY64NFSW4WIWE7D/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THK6G6CD4VW6RCROWUV2C4HSINKK3XAK/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R77EUWPZVP5WSMNXUXUDNHR7G7OI5NGM/ -

03 Oct 2023, 04:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TT7SF6CQ5VHAGFLWNXY64NFSW4WIWE7D/ -
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R77EUWPZVP5WSMNXUXUDNHR7G7OI5NGM/ -

29 Sep 2023, 02:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/THK6G6CD4VW6RCROWUV2C4HSINKK3XAK/ -

25 Sep 2023, 15:42

Type Values Removed Values Added
References (MISC) https://github.com/github/advisory-database/pull/2752 - (MISC) https://github.com/github/advisory-database/pull/2752 - Patch
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2240110 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2240110 - Third Party Advisory
References (MISC) https://crates.io/crates/tungstenite/versions - (MISC) https://crates.io/crates/tungstenite/versions - Release Notes
References (MISC) https://security-tracker.debian.org/tracker/CVE-2023-43669 - (MISC) https://security-tracker.debian.org/tracker/CVE-2023-43669 - Third Party Advisory
References (MISC) https://bugzilla.suse.com/show_bug.cgi?id=1215563 - (MISC) https://bugzilla.suse.com/show_bug.cgi?id=1215563 - Third Party Advisory
References (MISC) https://github.com/snapview/tungstenite-rs/issues/376 - (MISC) https://github.com/snapview/tungstenite-rs/issues/376 - Exploit, Issue Tracking
References (CONFIRM) https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2 - (CONFIRM) https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2 - Patch
References (MISC) https://github.com/advisories/GHSA-9mcr-873m-xcxp - (MISC) https://github.com/advisories/GHSA-9mcr-873m-xcxp - Third Party Advisory
References (MISC) https://cwe.mitre.org/data/definitions/407.html - (MISC) https://cwe.mitre.org/data/definitions/407.html - Technical Description
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Snapview
Snapview tungstenite
CPE cpe:2.3:a:snapview:tungstenite:*:*:*:*:*:rust:*:*

23 Sep 2023, 19:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/github/advisory-database/pull/2752 -
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2240110 -
  • (MISC) https://security-tracker.debian.org/tracker/CVE-2023-43669 -
  • (MISC) https://bugzilla.suse.com/show_bug.cgi?id=1215563 -
  • (CONFIRM) https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2 -
  • (MISC) https://github.com/advisories/GHSA-9mcr-873m-xcxp -
Summary The Tungstenite crate through 0.20.0 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes). The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).

21 Sep 2023, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-21 06:15

Updated : 2024-02-16 17:56


NVD link : CVE-2023-43669

Mitre link : CVE-2023-43669

CVE.ORG link : CVE-2023-43669


JSON object : View

Products Affected

fedoraproject

  • fedora

snapview

  • tungstenite