Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43970
PUBLISHED
More InfoOfficial Page
Assigner-EEF
Assigner Org ID-6b3ad84c-e1a6-4bf7-a703-f496b71e49db
View Known Exploited Vulnerability (KEV) details
Published At-13 May, 2026 | 18:43
Updated At-15 May, 2026 | 04:33
Rejected At-
▼CVE Numbering Authority (CNA)
Decompression Bomb in cow_spdy:inflate/2 Allows Memory Exhaustion via Crafted SPDY Frame

Improper Handling of Highly Compressed Data (Data Amplification) vulnerability in ninenines cowlib allows unauthenticated remote denial of service via memory exhaustion. cow_spdy:inflate/2 in cowlib passes peer-supplied compressed bytes directly to zlib:inflate/2 with no output size bound. The SPDY header compression dictionary (?ZDICT) is public, and zlib compresses long runs of repeated bytes at roughly 1024:1, so a few kilobytes of SPDY frame payload can decompress to gigabytes on the BEAM heap, OOM-killing the node. A single unauthenticated SPDY frame is sufficient to trigger the condition. The parsers for syn_stream, syn_reply, and headers frame types are all affected via cow_spdy:parse_headers/2. This issue affects cowlib from 0.1.0 before 2.16.1.

Affected Products
Vendor
ninenines
Product
cowlib
Collection URL
https://repo.hex.pm
Package Name
cowlib
Repo
https://github.com/ninenines/cowlib
CPEs
  • cpe:2.3:a:ninenines:cowlib:*:*:*:*:*:*:*:*
Modules
  • cow_spdy
Program Files
  • src/cow_spdy.erl
Program Routines
  • cow_spdy:parse/2
  • cow_spdy:inflate/2
  • cow_spdy:parse_headers/2
  • cow_spdy:parse_headers/4
Default Status
unaffected
Versions
Affected
  • From 0.1.0 before 2.16.1 (semver)
Vendor
ninenines
Product
cowlib
Collection URL
https://github.com
Package Name
ninenines/cowlib
Repo
https://github.com/ninenines/cowlib
CPEs
  • cpe:2.3:a:ninenines:cowlib:*:*:*:*:*:*:*:*
Modules
  • cow_spdy
Program Files
  • src/cow_spdy.erl
Program Routines
  • cow_spdy:parse/2
  • cow_spdy:inflate/2
  • cow_spdy:parse_headers/2
  • cow_spdy:parse_headers/4
Default Status
unaffected
Versions
Affected
  • From fad5c0049df278cc498b6cdb519b09e845a070a8 before 16aad3fb9f81f5cda4d1706ff0c54237c619c282 (git)
Problem Types
TypeCWE IDDescription
CWECWE-409CWE-409 Improper Handling of Highly Compressed Data (Data Amplification)
Type: CWE
CWE ID: CWE-409
Description: CWE-409 Improper Handling of Highly Compressed Data (Data Amplification)
Metrics
VersionBase scoreBase severityVector
4.08.2HIGH
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-130CAPEC-130 Excessive Allocation
CAPEC ID: CAPEC-130
Description: CAPEC-130 Excessive Allocation
Solutions

Upgrade to cowlib 2.16.1 or later, in which the cow_spdy module has been removed entirely. No patched version of cow_spdy will be provided. Migrate away from SPDY, which has been deprecated since 2015 in favour of HTTP/2.

Configurations

The application must use cow_spdy:parse/2 to parse SPDY frames from an untrusted peer. cowboy itself does not use cow_spdy; only direct callers of the cow_spdy API are affected.

Workarounds

Exploits

Credits

finder
Peter Ullrich
remediation developer
Loïc Hoguin
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cna.erlef.org/cves/CVE-2026-43970.html
related
third-party-advisory
https://osv.dev/vulnerability/EEF-CVE-2026-43970
related
https://github.com/ninenines/cowlib/commit/16aad3fb9f81f5cda4d1706ff0c54237c619c282
patch
Hyperlink: https://cna.erlef.org/cves/CVE-2026-43970.html
Resource:
related
third-party-advisory
Hyperlink: https://osv.dev/vulnerability/EEF-CVE-2026-43970
Resource:
related
Hyperlink: https://github.com/ninenines/cowlib/commit/16aad3fb9f81f5cda4d1706ff0c54237c619c282
Resource:
patch
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found