TopVuln

High-risk vulnerability digests

CVE-2021-32714

  • MEDIUM

CGA-G59P-VXQX-MGPM

Details

CVSS v3
5.9
CVSS v2
6.4
NVD published
2021-07-07 20:15:08
EPSS
0.4% probability · 60.7th percentile — 2026-05-03
Affected versions
cpe:2.3:a:hyper:hyper:*:*:*:*:*:rust:*:*
Summary
hyper is an HTTP library for Rust. In versions prior to 0.14.10, hyper's HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in "request smuggling" or "desync attacks." The vulnerability is patched in version 0.14.10. Two possible workarounds exist. One may reject requests manually that contain a `Transfer-Encoding` header or ensure any upstream proxy rejects `Transfer-Encoding` chunk sizes greater than what fits in 64-bit unsigned integers.
Remediation
Not available in our cache.
Exploit info
https://github.com/hyperium/hyper/security/advisories/GHSA-5h46-h7hh-c6x9

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.