PT-2026-36544 · Bandit · Bandit
Jonatan Männchen
+2
·
Published
2026-05-01
·
Updated
2026-05-01
·
CVE-2026-42788
CVSS v4.0
6.9
Medium
| Vector | AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
bandit versions 0.3.6 through 1.10.x
Description
An issue in the
deserialize/2 function within Elixir.Bandit.HTTP2.Frame allows unauthenticated memory exhaustion through oversized HTTP/2 frames. The system checks the SETTINGS MAX FRAME SIZE limit only after pattern-matching the payload size, requiring the entire frame body to be present in memory before the size guard is evaluated. This allows a peer to announce a frame length up to the 24-bit maximum (approximately 16 MiB), forcing the server to buffer the entire body regardless of the negotiated max frame size. An attacker maintaining multiple concurrent connections can cause significant memory pressure, leading to a denial of service.Recommendations
Update to version 1.11.0 or later.
Exploit
Fix
Allocation of Resources Without Limits
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Bandit