• CVE-2023-39326

发布时间: 2023年12月22日

修改时间: 2025年4月25日

概要

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS v3 指标

NVD openEuler
Confidentiality Low Low
Attack Vector Network Network
CVSS评分 5.3 5.3
Attack Complexity Low Low
Privileges Required None None
Scope Unchanged Unchanged
Integrity None None
User Interaction None None
Availability None None

安全公告

公告名 概要 发布时间
KylinSec-SA-2023-2052 golang security update 2023年12月22日
KylinSec-SA-2025-1601 etcd security update 2025年3月13日
KylinSec-SA-2025-2438 golang security update 2025年6月3日

影响产品

产品 状态
KY3.4-4A golang Fixed
KY3.4-5A golang Fixed
KY3.5.2 golang Fixed
KY3.5.1 golang Fixed
V6 golang Fixed