CVE-2025-64702
MEDIUMQuic-go < 0.57.0 - Resource Allocation Without Limits
Title source: ruleDescription
quic-go is an implementation of the QUIC protocol in Go. Versions 0.56.0 and below are vulnerable to excessive memory allocation through quic-go's HTTP/3 client and server implementations by sending a QPACK-encoded HEADERS frame that decodes into a large header field section (many unique header names and/or large values). The implementation builds an http.Header (used on the http.Request and http.Response, respectively), while only enforcing limits on the size of the (QPACK-compressed) HEADERS frame, but not on the decoded header, leading to memory exhaustion. This issue is fixed in version 0.57.0.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/quic-go/quic-go/security/advisories/GHSA-g754-hx8w-x2g6
Scores
CVSS v3
5.3
EPSS
0.0008
EPSS Percentile
23.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-770
Status
published
Products (2)
quic-go/quic-go
0 - 0.57.0Go
quic-go_project/quic-go
< 0.57.0
Published
Dec 11, 2025
Tracked Since
Feb 18, 2026