🔐 CVE Alert

CVE-2026-7790

UNKNOWN 0.0

Unbounded chunk-size hex digits in cowlib cause quadratic CPU and memory DoS

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Uncontrolled Resource Consumption vulnerability in ninenines cowlib (cow_http_te module) allows Excessive Allocation. The chunked transfer-encoding parser in cow_http_te accepts an unbounded number of hex digits in the chunk-size field. Each digit causes a bignum multiplication (Len * 16 + digit), so parsing N hex digits requires O(N²) CPU work and O(N) memory. Additionally, when input is drip-fed, the parser discards the accumulated length on each partial read and restarts from zero on resumption, raising the cost to O(N³). An unauthenticated remote attacker can exploit this by sending an HTTP/1.1 request with Transfer-Encoding: chunked and a very long chunk-size hex string to cause denial of service through CPU exhaustion and memory amplification. This vulnerability is associated with program file src/cow_http_te.erl and program routines cow_http_te:stream_chunked/2, cow_http_te:chunked_len/4. This issue affects cowlib: from 0.6.0 before 2.16.1.

CWE CWE-400
Vendor ninenines
Product cowlib
Published May 11, 2026
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for ninenines cowlib

Be the first to know when new unknown vulnerabilities affecting ninenines cowlib are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

ninenines / cowlib
0.6.0 < 2.16.1
ninenines / cowlib
8c0e428b012c59f553a264f285ed89d36f791e3e < a4b8039ce8c93ab00867ef6b7e888822c09f4369

References

NVD ↗ CVE.org ↗ EPSS Data ↗
cna.erlef.org: https://cna.erlef.org/cves/CVE-2026-7790.html osv.dev: https://osv.dev/vulnerability/EEF-CVE-2026-7790 github.com: https://github.com/ninenines/cowlib/commit/a4b8039ce8c93ab00867ef6b7e888822c09f4369

Credits

Peter Ullrich Loïc Hoguin