Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.
Metrics
Affected Vendors & Products
References
History
Thu, 30 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 30 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Golang
Golang net |
|
| Vendors & Products |
Golang
Golang net |
Wed, 29 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption. | |
| Title | Lack of limit when parsing cookies can cause memory exhaustion in net/http | |
| References |
|
Status: PUBLISHED
Assigner: Go
Published: 2025-10-29T22:10:13.912Z
Updated: 2025-10-30T14:24:50.235Z
Reserved: 2025-08-27T14:50:58.691Z
Link: CVE-2025-58186
Updated: 2025-10-30T14:24:38.946Z
Status : Awaiting Analysis
Published: 2025-10-29T23:16:19.547
Modified: 2025-10-30T15:15:40.070
Link: CVE-2025-58186
No data.