In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.
Start learningUpgrade ring
to version 0.17.12 or higher.
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the HeaderProtectionKey::new_mask
function. An attacker can induce a panic by sending a specially-crafted packet. This is only exploitable if overflow checking is enabled, which is not the default setting in release mode but can be enabled via RUSTFLAGS="-C overflow-checks"
or overflow-checks = true
in the Cargo.toml profile. Similarly, operations using AES_128_GCM
and AES_256_GCM
may also panic when processing large data chunks (about 64 gigabytes) under the same conditions, although common protocols like TLS and SSH are not affected as they process data in smaller segments.