Skip to content

HPACK Denial of Service vulnerability (HPACK Bomb)

High severity GitHub Reviewed Published Jul 5, 2019 to the GitHub Advisory Database • Updated Aug 17, 2023

Package

pip hpack (pip)

Affected versions

>= 1.0.0, < 2.3.0

Patched versions

2.3.0

Description

A HTTP/2 implementation built using any version of the Python HPACK library between v1.0.0 and v2.2.0 could be targeted for a denial of service attack, specifically a so-called "HPACK Bomb" attack. This attack occurs when an attacker inserts a header field that is exactly the size of the HPACK dynamic header table into the dynamic header table. The attacker can then send a header block that is simply repeated requests to expand that field in the dynamic table. This can lead to a gigantic compression ratio of 4,096 or better, meaning that 16kB of data can decompress to 64MB of data on the target machine.

References

Published to the GitHub Advisory Database Jul 5, 2019
Reviewed Jun 16, 2020
Last updated Aug 17, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Weaknesses

No CWEs

CVE ID

CVE-2016-6581

GHSA ID

GHSA-ffq8-576r-v26g

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.