CVE-2026-43970 PUBLISHED

Decompression Bomb in cow_spdy:inflate/2 Allows Memory Exhaustion via Crafted SPDY Frame

Assigner: EEF
Reserved: 04.05.2026 Published: 13.05.2026 Updated: 13.05.2026

Improper Handling of Highly Compressed Data (Data Amplification) vulnerability in ninenines cowlib allows unauthenticated remote denial of service via memory exhaustion.

cow_spdy:inflate/2 in cowlib passes peer-supplied compressed bytes directly to zlib:inflate/2 with no output size bound. The SPDY header compression dictionary (?ZDICT) is public, and zlib compresses long runs of repeated bytes at roughly 1024:1, so a few kilobytes of SPDY frame payload can decompress to gigabytes on the BEAM heap, OOM-killing the node. A single unauthenticated SPDY frame is sufficient to trigger the condition. The parsers for syn_stream, syn_reply, and headers frame types are all affected via cow_spdy:parse_headers/2.

This issue affects cowlib from 0.1.0 before 2.16.1.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.2

Product Status

Vendor ninenines
Product cowlib
Versions Default: unaffected
  • affected from 0.1.0 to 2.16.1 (excl.)
Vendor ninenines
Product cowlib
Versions Default: unaffected
  • affected from fad5c0049df278cc498b6cdb519b09e845a070a8 to 16aad3fb9f81f5cda4d1706ff0c54237c619c282 (excl.)

Affected Configurations

The application must use cow_spdy:parse/2 to parse SPDY frames from an untrusted peer. cowboy itself does not use cow_spdy; only direct callers of the cow_spdy API are affected.

Solutions

Upgrade to cowlib 2.16.1 or later, in which the cow_spdy module has been removed entirely. No patched version of cow_spdy will be provided. Migrate away from SPDY, which has been deprecated since 2015 in favour of HTTP/2.

Credits

  • Peter Ullrich finder
  • Loïc Hoguin remediation developer

References

Problem Types

  • CWE-409 Improper Handling of Highly Compressed Data (Data Amplification) CWE

Impacts

  • CAPEC-130 Excessive Allocation