CVE Vulnerabilities

CVE-2016-9643

Uncontrolled Resource Consumption

Published: Mar 07, 2017 | Modified: Apr 20, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and a large number of +) (plus close parenthesis).

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
WebkitWebkit2.4.11 (including)2.4.11 (including)
QtwebkitUbuntueoan*
Qtwebkit-opensource-srcUbuntuartful*
Qtwebkit-opensource-srcUbuntubionic*
Qtwebkit-opensource-srcUbuntucosmic*
Qtwebkit-opensource-srcUbuntudevel*
Qtwebkit-opensource-srcUbuntudisco*
Qtwebkit-opensource-srcUbuntueoan*
Qtwebkit-opensource-srcUbuntuesm-apps/bionic*
Qtwebkit-opensource-srcUbuntuesm-apps/focal*
Qtwebkit-opensource-srcUbuntuesm-apps/jammy*
Qtwebkit-opensource-srcUbuntuesm-apps/noble*
Qtwebkit-opensource-srcUbuntuesm-infra/xenial*
Qtwebkit-opensource-srcUbuntufocal*
Qtwebkit-opensource-srcUbuntugroovy*
Qtwebkit-opensource-srcUbuntuhirsute*
Qtwebkit-opensource-srcUbuntuimpish*
Qtwebkit-opensource-srcUbuntujammy*
Qtwebkit-opensource-srcUbuntukinetic*
Qtwebkit-opensource-srcUbuntulunar*
Qtwebkit-opensource-srcUbuntumantic*
Qtwebkit-opensource-srcUbuntunoble*
Qtwebkit-opensource-srcUbuntutrusty*
Qtwebkit-opensource-srcUbuntuupstream*
Qtwebkit-opensource-srcUbuntuxenial*
Qtwebkit-opensource-srcUbuntuyakkety*
Qtwebkit-opensource-srcUbuntuzesty*
Qtwebkit-sourceUbuntuartful*
Qtwebkit-sourceUbuntubionic*
Qtwebkit-sourceUbuntucosmic*
Qtwebkit-sourceUbuntudisco*
Qtwebkit-sourceUbuntuesm-apps/bionic*
Qtwebkit-sourceUbuntuesm-apps/xenial*
Qtwebkit-sourceUbuntuprecise*
Qtwebkit-sourceUbuntutrusty*
Qtwebkit-sourceUbuntuxenial*
Qtwebkit-sourceUbuntuyakkety*
Qtwebkit-sourceUbuntuzesty*
Webkit2gtkUbuntuesm-infra/xenial*
Webkit2gtkUbuntuupstream*
Webkit2gtkUbuntuxenial*
Webkit2gtkUbuntuyakkety*
WebkitgtkUbuntuartful*
WebkitgtkUbuntubionic*
WebkitgtkUbuntucosmic*
WebkitgtkUbuntuesm-apps/bionic*
WebkitgtkUbuntuesm-apps/xenial*
WebkitgtkUbuntutrusty*
WebkitgtkUbuntuupstream*
WebkitgtkUbuntuxenial*
WebkitgtkUbuntuyakkety*
WebkitgtkUbuntuzesty*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References