Uploaded image for project: 'Qt'
  1. Qt
  2. QTBUG-48123

QWebSocketServer DoS while parsing a malformed WebSocket handshake

    XMLWordPrintable

Details

    • Bug
    • Resolution: Done
    • P2: Important
    • 5.6.0 RC
    • 5.5.0
    • WebSockets
    • None
    • Tested on Xubuntu 14.04 with Qt 5.5.
    • 12e424f241b29ef26ad2a3a70740d8b320e9e85a

    Description

      QWebSocketServer is vulnerable to a DoS attack caused by improper parsing of WebSocket handshake. This happens because QWebSocketServer attempts to read from the client until a newline is encountered. If no newline is sent it will read data from the client until all available memory is consumed.

      Addendum: when valid header lines are sent (terminated by CRLF), but when no blank line is sent (double CRLF), then the same behaviour occurs.

      Attachments

        No reviews matched the request. Check your Options in the drop-down menu of this sections header.

        Activity

          People

            kurt.pattyn Kurt Pattyn
            kurt.pattyn Kurt Pattyn
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved:

              Gerrit Reviews

                There are no open Gerrit changes