{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-43669","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-02T19:44:43.829Z","dateReserved":"2023-09-21T00:00:00.000Z","datePublished":"2023-09-21T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2023-10-03T03:06:31.221Z"},"descriptions":[{"lang":"en","value":"The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes)."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://github.com/snapview/tungstenite-rs/issues/376"},{"url":"https://cwe.mitre.org/data/definitions/407.html"},{"url":"https://crates.io/crates/tungstenite/versions"},{"url":"https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2"},{"url":"https://github.com/advisories/GHSA-9mcr-873m-xcxp"},{"url":"https://github.com/github/advisory-database/pull/2752"},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1215563"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240110"},{"url":"https://security-tracker.debian.org/tracker/CVE-2023-43669"},{"name":"FEDORA-2023-91a66898d2","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THK6G6CD4VW6RCROWUV2C4HSINKK3XAK/"},{"name":"FEDORA-2023-e72bf7b92e","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT7SF6CQ5VHAGFLWNXY64NFSW4WIWE7D/"},{"name":"FEDORA-2023-9c4142423a","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R77EUWPZVP5WSMNXUXUDNHR7G7OI5NGM/"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T19:44:43.829Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/snapview/tungstenite-rs/issues/376","tags":["x_transferred"]},{"url":"https://cwe.mitre.org/data/definitions/407.html","tags":["x_transferred"]},{"url":"https://crates.io/crates/tungstenite/versions","tags":["x_transferred"]},{"url":"https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2","tags":["x_transferred"]},{"url":"https://github.com/advisories/GHSA-9mcr-873m-xcxp","tags":["x_transferred"]},{"url":"https://github.com/github/advisory-database/pull/2752","tags":["x_transferred"]},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1215563","tags":["x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240110","tags":["x_transferred"]},{"url":"https://security-tracker.debian.org/tracker/CVE-2023-43669","tags":["x_transferred"]},{"name":"FEDORA-2023-91a66898d2","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THK6G6CD4VW6RCROWUV2C4HSINKK3XAK/"},{"name":"FEDORA-2023-e72bf7b92e","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT7SF6CQ5VHAGFLWNXY64NFSW4WIWE7D/"},{"name":"FEDORA-2023-9c4142423a","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R77EUWPZVP5WSMNXUXUDNHR7G7OI5NGM/"}]}]}}