Title
cpython: Excessive read buffering DoS in http.client
Description
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
Severity
HIGH
Fixed in Version
No known fix at this time
Primary URL
https://avd.aquasec.com/nvd/cve-2025-13836
Additional Information
Vulnerability ID: CVE-2025-13836}
Package Name: libpython3.13-stdlib
Package Version: 3.13.5-2
References
Title
cpython: Excessive read buffering DoS in http.client
Description
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
Severity
HIGH
Fixed in Version
No known fix at this time
Primary URL
https://avd.aquasec.com/nvd/cve-2025-13836
Additional Information
Vulnerability ID: CVE-2025-13836}
Package Name: libpython3.13-stdlib
Package Version: 3.13.5-2
References