← Volver a CVEs
CVE-2026-42582
HIGH7.5
Descripcion
Netty is an asynchronous, event-driven network application framework. Prior to 4.2.13.Final, when decoding header blocks, the non-Huffman branch of io.netty.handler.codec.http3.QpackDecoder#decodeHuffmanEncodedLiteral may execute new byte[length] for a string literal before verifying that length bytes are actually present in the compressed field section. The wire encoding allows a very large length to be expressed in few bytes. There is no check that length <= in.readableBytes() before new byte[length]. This vulnerability is fixed in 4.2.13.Final.
Detalles CVE
Puntuacion CVSS v3.17.5
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado5/13/2026
Ultima modificacion5/13/2026
Fuentenvd
Avistamientos honeypot0
Debilidades (CWE)
CWE-770CWE-789
Referencias
https://github.com/netty/netty/security/advisories/GHSA-2c5c-chwr-9hqw(security-advisories@github.com)
https://github.com/netty/netty/security/advisories/GHSA-2c5c-chwr-9hqw(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.