TopVuln

High-risk vulnerability digests

CVE-2026-35469

  • HIGH

MINI-58VC-R9W4-V596

Details

CVSS v3
8.7
CVSS v4
8.7
NVD published
2026-04-16 22:16:37
EPSS
<0.1% probability · 4.8th percentile — 2026-05-12
Affected versions
spdystream versions 0.5.0 and below
Summary
This vulnerability impacts the open source Go spdystream library for multiplexing streams over SPDY connections. The SPDY/3 frame parser does not validate attacker-controlled frame counts and lengths before allocating memory, affecting three distinct code paths. A small compressed on-the-wire payload can decompress into extremely large attacker-controlled allocation sizes, leading to process out-of-memory crashes. A remote unauthenticated attacker can trigger this denial of service with a single crafted SPDY frame.
Remediation
Upgrade the spdystream library to version 0.5.1 or later, which fixes this issue. Audit application dependencies to confirm the patched version is pulled into your build and runtime environments. If immediate upgrade is not possible, restrict access to SPDY endpoints to only trusted peers.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.