PT-2026-36544 · Bandit · Bandit

Jonatan Männchen

+2

·

Published

2026-05-01

·

Updated

2026-05-01

·

CVE-2026-42788

CVSS v4.0

6.9

Medium

VectorAV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions bandit versions 0.3.6 through 1.10.x
Description An issue in the deserialize/2 function within Elixir.Bandit.HTTP2.Frame allows unauthenticated memory exhaustion through oversized HTTP/2 frames. The system checks the SETTINGS MAX FRAME SIZE limit only after pattern-matching the payload size, requiring the entire frame body to be present in memory before the size guard is evaluated. This allows a peer to announce a frame length up to the 24-bit maximum (approximately 16 MiB), forcing the server to buffer the entire body regardless of the negotiated max frame size. An attacker maintaining multiple concurrent connections can cause significant memory pressure, leading to a denial of service.
Recommendations Update to version 1.11.0 or later.

Exploit

Fix

Allocation of Resources Without Limits

Weakness Enumeration

Related Identifiers

CVE-2026-42788

Affected Products

Bandit