hello-world.rs
hello-world.rs copied to clipboard
CVE-2023-26964 (Medium) detected in multiple libraries
CVE-2023-26964 - Medium Severity Vulnerability
Vulnerable Libraries - hyper-0.14.19.crate, hyper-0.13.10.crate, h2-0.3.13.crate, hyper-0.10.16.crate, h2-0.2.7.crate
hyper-0.14.19.crate
A fast and correct HTTP library.
Library home page: https://crates.io/api/v1/crates/hyper/0.14.19/download
Dependency Hierarchy:
- :x: hyper-0.14.19.crate (Vulnerable Library)
hyper-0.13.10.crate
A fast and correct HTTP library.
Library home page: https://crates.io/api/v1/crates/hyper/0.13.10/download
Dependency Hierarchy:
- webdriver-0.44.0.crate (Root Library)
- warp-0.2.5.crate
- :x: hyper-0.13.10.crate (Vulnerable Library)
- warp-0.2.5.crate
h2-0.3.13.crate
An HTTP/2 client and server
Library home page: https://crates.io/api/v1/crates/h2/0.3.13/download
Dependency Hierarchy:
- yubico-0.10.0.crate (Root Library)
- reqwest-0.11.11.crate
- :x: h2-0.3.13.crate (Vulnerable Library)
- reqwest-0.11.11.crate
hyper-0.10.16.crate
A fast and correct HTTP library.
Library home page: https://crates.io/api/v1/crates/hyper/0.10.16/download
Dependency Hierarchy:
- multipart-0.18.0.crate (Root Library)
- nickel-0.11.0.crate
- :x: hyper-0.10.16.crate (Vulnerable Library)
- nickel-0.11.0.crate
h2-0.2.7.crate
An HTTP/2.0 client and server
Library home page: https://crates.io/api/v1/crates/h2/0.2.7/download
Dependency Hierarchy:
- webdriver-0.44.0.crate (Root Library)
- warp-0.2.5.crate
- hyper-0.13.10.crate
- :x: h2-0.2.7.crate (Vulnerable Library)
- hyper-0.13.10.crate
- warp-0.2.5.crate
Found in HEAD commit: a5a175063bd51fcbbce0eaba88d1b9b6ad315911
Found in base branch: master
Vulnerability Details
An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).
Publish Date: 2023-04-11
URL: CVE-2023-26964
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Step up your Open Source Security Game with Mend here