quic-go is an implementation of the QUIC protocol in Go. Versions 0.56.0 and below are vulnerable to excessive memory allocation through quic-go's HTTP/3 client and server implementations by sending a QPACK-encoded HEADERS frame that decodes into a large header field section (many unique header names and/or large values). The implementation builds an http.Header (used on the http.Request and http.Response, respectively), while only enforcing limits on the size of the (QPACK-compressed) HEADERS frame, but not on the decoded header, leading to memory exhaustion. This issue is fixed in version 0.57.0.
History

Fri, 12 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Quic-go Project
Quic-go Project quic-go
Vendors & Products Quic-go Project
Quic-go Project quic-go

Thu, 11 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description quic-go is an implementation of the QUIC protocol in Go. Versions 0.56.0 and below are vulnerable to excessive memory allocation through quic-go's HTTP/3 client and server implementations by sending a QPACK-encoded HEADERS frame that decodes into a large header field section (many unique header names and/or large values). The implementation builds an http.Header (used on the http.Request and http.Response, respectively), while only enforcing limits on the size of the (QPACK-compressed) HEADERS frame, but not on the decoded header, leading to memory exhaustion. This issue is fixed in version 0.57.0.
Title quic-go HTTP/3 QPACK Header Expansion DoS
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-12-11T20:58:10.517Z

Updated: 2025-12-12T20:45:30.439Z

Reserved: 2025-11-10T14:07:42.920Z

Link: CVE-2025-64702

cve-icon Vulnrichment

Updated: 2025-12-12T20:44:58.953Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-11T21:15:54.707

Modified: 2025-12-12T15:17:31.973

Link: CVE-2025-64702

cve-icon Redhat

No data.