Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.7

Sliver Server Crashes from Malicious Compressed Data

GHSA-2phg-qgmm-r638
Summary

Sliver server may crash if it receives a large, specially crafted compressed file. This can happen if an attacker sends a massive compressed file to the server, causing it to run out of memory and crash. To protect your server, update to the latest version of Sliver, available at https://github.com/BishopFox/sliver/releases/tag/v1.7.2.

What to do
  • Update github.com bishopfox to version 1.7.2.
Affected software
VendorProductAffected versionsFix available
github.com bishopfox <= 1.7.2 1.7.2
Original title
Sliver has Potential Zip Bomb Denial of Service in GzipEncoder
Original description
### Summary

GzipEncoder does not limit output size when processing compressed data. This allows unauthenticated remote attackers to crash sliver server by sending a http request with highly compressed gzip data (aka zip bomb).

### Details

In `util/encoders/gzip.go`, `Decode()` method decompresses given data by reading the entire gzip buffer at once without limiting output size.

### PoC

```python
data = gzip.compress(bytes(1024 * 1024 * 1024)) * 16
requests.post(f"http://172.17.0.2/{nonce}", data=data)
```

### Impact

Unauthenticated remote attackers can exhaust memory and cpu resource of sliver server and crash it when they have GzipEncoderID, which can be easily retrived from implant's http traffic, or by brute-forcing.

A fixed version is available at https://github.com/BishopFox/sliver/releases/tag/v1.7.2.
ghsa CVSS4.0 7.7
Vulnerability type
CWE-409
Published: 25 Feb 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026