Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:python:hpack:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "149D1734-DC22-49C7-8989-ED1C72638E4C", "vulnerable": true}, {"criteria": "cpe:2.3:a:python:hpack:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C4CB9C9-A06D-4D40-935A-71CDEECEDE97", "vulnerable": true}, {"criteria": "cpe:2.3:a:python:hpack:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE6FFC07-34D1-4654-BDB8-D0DEB238E3EF", "vulnerable": true}, {"criteria": "cpe:2.3:a:python:hpack:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "212AFC19-357E-430C-BA91-028D4F9943BC", "vulnerable": true}, {"criteria": "cpe:2.3:a:python:hpack:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A0714A00-3404-4900-BFE5-71D5395C0CDA", "vulnerable": true}, {"criteria": "cpe:2.3:a:python:hyper:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "18CD48D6-EC6C-4D54-8ACE-78C6125B48B9", "vulnerable": true}, {"criteria": "cpe:2.3:a:python:hyper:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B79FFFB-F324-4B96-9D9D-79643D17B85E", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "A HTTP/2 implementation built using any version of the Python HPACK library between v1.0.0 and v2.2.0 could be targeted for a denial of service attack, specifically a so-called \"HPACK Bomb\" attack. This attack occurs when an attacker inserts a header field that is exactly the size of the HPACK dynamic header table into the dynamic header table. The attacker can then send a header block that is simply repeated requests to expand that field in the dynamic table. This can lead to a gigantic compression ratio of 4,096 or better, meaning that 16kB of data can decompress to 64MB of data on the target machine."}, {"lang": "es", "value": "Una implementaci\u00f3n de HTTP/2 construida usando cualquier versi\u00f3n de la librer\u00eda de Python HPACK entre las versiones v1.0.0 y v2.2.0 podr\u00eda ser atacada por un ataque de denegaci\u00f3n de servicio, especialmente un ataque llamado \"HPACK Bomb\". Este ataque ocurre cuando un atacante inserta un campo de cabecera que es exactamente del tama\u00f1o de la tabla de cabecera din\u00e1mica HPACK dentro de la tabla de cabecera din\u00e1mica. El atacante puede entonces enviar un bloque de cabecera que simplemente repita solicitudes para expandir ese campo en la tabla din\u00e1mica. Esto puede conducir a un ratio de compresi\u00f3n gigante de 4,096 o mayor, significando que 16kB de datos pueden descomprimirse a 64MB de datos en la m\u00e1quina objetivo."}], "id": "CVE-2016-6581", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-01-10T15:59:00.423", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/92315"}, {"source": "cve@mitre.org", "tags": ["Mitigation", "Vendor Advisory"], "url": "https://python-hyper.org/hpack/en/latest/security/CVE-2016-6581.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/92315"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mitigation", "Vendor Advisory"], "url": "https://python-hyper.org/hpack/en/latest/security/CVE-2016-6581.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-399"}], "source": "nvd@nist.gov", "type": "Primary"}]}