hello-world.rs icon indicating copy to clipboard operation
hello-world.rs copied to clipboard

CVE-2023-26964 (Medium) detected in multiple libraries

Open mend-bolt-for-github[bot] opened this issue 2 years ago • 0 comments

CVE-2023-26964 - Medium Severity Vulnerability

Vulnerable Libraries - hyper-0.14.19.crate, hyper-0.13.10.crate, h2-0.3.13.crate, hyper-0.10.16.crate, h2-0.2.7.crate

hyper-0.14.19.crate

A fast and correct HTTP library.

Library home page: https://crates.io/api/v1/crates/hyper/0.14.19/download

Dependency Hierarchy:

  • :x: hyper-0.14.19.crate (Vulnerable Library)
hyper-0.13.10.crate

A fast and correct HTTP library.

Library home page: https://crates.io/api/v1/crates/hyper/0.13.10/download

Dependency Hierarchy:

  • webdriver-0.44.0.crate (Root Library)
    • warp-0.2.5.crate
      • :x: hyper-0.13.10.crate (Vulnerable Library)
h2-0.3.13.crate

An HTTP/2 client and server

Library home page: https://crates.io/api/v1/crates/h2/0.3.13/download

Dependency Hierarchy:

  • yubico-0.10.0.crate (Root Library)
    • reqwest-0.11.11.crate
      • :x: h2-0.3.13.crate (Vulnerable Library)
hyper-0.10.16.crate

A fast and correct HTTP library.

Library home page: https://crates.io/api/v1/crates/hyper/0.10.16/download

Dependency Hierarchy:

  • multipart-0.18.0.crate (Root Library)
    • nickel-0.11.0.crate
      • :x: hyper-0.10.16.crate (Vulnerable Library)
h2-0.2.7.crate

An HTTP/2.0 client and server

Library home page: https://crates.io/api/v1/crates/h2/0.2.7/download

Dependency Hierarchy:

  • webdriver-0.44.0.crate (Root Library)
    • warp-0.2.5.crate
      • hyper-0.13.10.crate
        • :x: h2-0.2.7.crate (Vulnerable Library)

Found in HEAD commit: a5a175063bd51fcbbce0eaba88d1b9b6ad315911

Found in base branch: master

Vulnerability Details

An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).

Publish Date: 2023-04-11

URL: CVE-2023-26964

CVSS 3 Score Details (5.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.


Step up your Open Source Security Game with Mend here