Uploaded image for project: 'Qt'
  1. Qt
  2. QTBUG-48123

QWebSocketServer DoS while parsing a malformed WebSocket handshake

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Done
    • Icon: P2: Important P2: Important
    • 5.6.0 RC
    • 5.5.0
    • WebSockets
    • None
    • Tested on Xubuntu 14.04 with Qt 5.5.
    • 12e424f241b29ef26ad2a3a70740d8b320e9e85a

      QWebSocketServer is vulnerable to a DoS attack caused by improper parsing of WebSocket handshake. This happens because QWebSocketServer attempts to read from the client until a newline is encountered. If no newline is sent it will read data from the client until all available memory is consumed.

      Addendum: when valid header lines are sent (terminated by CRLF), but when no blank line is sent (double CRLF), then the same behaviour occurs.

        No reviews matched the request. Check your Options in the drop-down menu of this sections header.

            kurt.pattyn Kurt Pattyn
            kurt.pattyn Kurt Pattyn
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

              Created:
              Updated:
              Resolved:

                There are no open Gerrit changes