fkie_cve-2016-6581
Vulnerability from fkie_nvd
Published
2017-01-10 15:59
Modified
2025-04-20 01:37
Summary
A HTTP/2 implementation built using any version of the Python HPACK library between v1.0.0 and v2.2.0 could be targeted for a denial of service attack, specifically a so-called "HPACK Bomb" attack. This attack occurs when an attacker inserts a header field that is exactly the size of the HPACK dynamic header table into the dynamic header table. The attacker can then send a header block that is simply repeated requests to expand that field in the dynamic table. This can lead to a gigantic compression ratio of 4,096 or better, meaning that 16kB of data can decompress to 64MB of data on the target machine.
Impacted products
Vendor Product Version
python hpack 1.0
python hpack 2.0
python hpack 2.0.1
python hpack 2.1.1
python hpack 2.2
python hyper 0.4
python hyper 0.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:python:hpack:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "149D1734-DC22-49C7-8989-ED1C72638E4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:hpack:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C4CB9C9-A06D-4D40-935A-71CDEECEDE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:hpack:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE6FFC07-34D1-4654-BDB8-D0DEB238E3EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:hpack:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "212AFC19-357E-430C-BA91-028D4F9943BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:hpack:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0714A00-3404-4900-BFE5-71D5395C0CDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:hyper:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "18CD48D6-EC6C-4D54-8ACE-78C6125B48B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:python:hyper:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B79FFFB-F324-4B96-9D9D-79643D17B85E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A HTTP/2 implementation built using any version of the Python HPACK library between v1.0.0 and v2.2.0 could be targeted for a denial of service attack, specifically a so-called \"HPACK Bomb\" attack. This attack occurs when an attacker inserts a header field that is exactly the size of the HPACK dynamic header table into the dynamic header table. The attacker can then send a header block that is simply repeated requests to expand that field in the dynamic table. This can lead to a gigantic compression ratio of 4,096 or better, meaning that 16kB of data can decompress to 64MB of data on the target machine."
    },
    {
      "lang": "es",
      "value": "Una implementaci\u00f3n de HTTP/2 construida usando cualquier versi\u00f3n de la librer\u00eda de Python HPACK entre las versiones v1.0.0 y v2.2.0 podr\u00eda ser atacada por un ataque de denegaci\u00f3n de servicio, especialmente un ataque llamado \"HPACK Bomb\". Este ataque ocurre cuando un atacante inserta un campo de cabecera que es exactamente del tama\u00f1o de la tabla de cabecera din\u00e1mica HPACK dentro de la tabla de cabecera din\u00e1mica. El atacante puede entonces enviar un bloque de cabecera que simplemente repita solicitudes para expandir ese campo en la tabla din\u00e1mica. Esto puede conducir a un ratio de compresi\u00f3n gigante de 4,096 o mayor, significando que 16kB de datos pueden descomprimirse a 64MB de datos en la m\u00e1quina objetivo."
    }
  ],
  "id": "CVE-2016-6581",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-01-10T15:59:00.423",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/92315"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://python-hyper.org/hpack/en/latest/security/CVE-2016-6581.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/92315"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://python-hyper.org/hpack/en/latest/security/CVE-2016-6581.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…