Index
Bugtraq
Pełna lista
Błędy
Sztuczki
Exploity
Dorks list
Tylko z CVE
Tylko z CWE
Bogus
Ranking
CVEMAP
Świeża lista CVE
Producenci
Produkty
Słownik CWE
Sprawdź nr. CVE
Sprawdź nr. CWE
Szukaj
W Bugtraq
W bazie CVE
Po autorze
Po nr. CVE
Po nr. CWE
Po producencie
Po produkcie
RSS
Bugtraq
CVEMAP
CVE Produkty
Tylko Błędy
Tylko Exploity
Tylko Dorks
Więcej
cIFrex
Facebook
Twitter
Donate
O bazie
Lang
Polish
English
Submit
Podatności dla
'Hyper'
2017-01-10
CVE-2016-6581
A HTTP/2 implementation built using any version of the Python HPACK library between v1.0.0 and v2.2.0 could be targeted for a denial of service attack, specifically a so-called "HPACK Bomb" attack. This attack occurs when an attacker inserts a header field that is exactly the size of the HPACK dynamic header table into the dynamic header table. The attacker can then send a header block that is simply repeated requests to expand that field in the dynamic table. This can lead to a gigantic compression ratio of 4,096 or better, meaning that 16kB of data can decompress to 64MB of data on the target machine.
>>>
Vendor:
Python
28
Produkty
Python
Virtualenv
Beaker
Keyring
PIP
Setuptools
RPLY
Pyxdg
Pillow
Python-gnupg
Requests
Tgcaptcha2
Python priority library
Hpack
Hyper
Urllib3
Openpyxl
Tablib
Simplejson
Pykerberos
Pypiserver
RSA
Novajoin
Pyxml
Typed ast
Py-bcrypt
Jw.util
Pybluemonday
Copyright
2024
, cxsecurity.com
Back to Top