cowlib cow_http_te module: Uncontrolled Resource Consumption vulnerability allows Excessive Allocation
High severity
GitHub Reviewed
Published
May 11, 2026
to the GitHub Advisory Database
•
Updated May 18, 2026
Description
Published by the National Vulnerability Database
May 11, 2026
Published to the GitHub Advisory Database
May 11, 2026
Reviewed
May 18, 2026
Last updated
May 18, 2026
Uncontrolled Resource Consumption vulnerability in ninenines cowlib (cow_http_te module) allows Excessive Allocation.
The chunked transfer-encoding parser in cow_http_te accepts an unbounded number of hex digits in the chunk-size field. Each digit causes a bignum multiplication (Len * 16 + digit), so parsing N hex digits requires O(N²) CPU work and O(N) memory. Additionally, when input is drip-fed, the parser discards the accumulated length on each partial read and restarts from zero on resumption, raising the cost to O(N³). An unauthenticated remote attacker can exploit this by sending an HTTP/1.1 request with Transfer-Encoding: chunked and a very long chunk-size hex string to cause denial of service through CPU exhaustion and memory amplification.
This vulnerability is associated with program file src/cow_http_te.erl and program routines cow_http_te:stream_chunked/2, cow_http_te:chunked_len/4.
This issue affects cowlib: from 0.6.0 before 2.16.1.
References