Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.7
Sliver Server Crashes from Malicious Compressed Data
GHSA-2phg-qgmm-r638
Summary
Sliver server may crash if it receives a large, specially crafted compressed file. This can happen if an attacker sends a massive compressed file to the server, causing it to run out of memory and crash. To protect your server, update to the latest version of Sliver, available at https://github.com/BishopFox/sliver/releases/tag/v1.7.2.
What to do
- Update github.com bishopfox to version 1.7.2.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| github.com | bishopfox | <= 1.7.2 | 1.7.2 |
Original title
Sliver has Potential Zip Bomb Denial of Service in GzipEncoder
Original description
### Summary
GzipEncoder does not limit output size when processing compressed data. This allows unauthenticated remote attackers to crash sliver server by sending a http request with highly compressed gzip data (aka zip bomb).
### Details
In `util/encoders/gzip.go`, `Decode()` method decompresses given data by reading the entire gzip buffer at once without limiting output size.
### PoC
```python
data = gzip.compress(bytes(1024 * 1024 * 1024)) * 16
requests.post(f"http://172.17.0.2/{nonce}", data=data)
```
### Impact
Unauthenticated remote attackers can exhaust memory and cpu resource of sliver server and crash it when they have GzipEncoderID, which can be easily retrived from implant's http traffic, or by brute-forcing.
A fixed version is available at https://github.com/BishopFox/sliver/releases/tag/v1.7.2.
GzipEncoder does not limit output size when processing compressed data. This allows unauthenticated remote attackers to crash sliver server by sending a http request with highly compressed gzip data (aka zip bomb).
### Details
In `util/encoders/gzip.go`, `Decode()` method decompresses given data by reading the entire gzip buffer at once without limiting output size.
### PoC
```python
data = gzip.compress(bytes(1024 * 1024 * 1024)) * 16
requests.post(f"http://172.17.0.2/{nonce}", data=data)
```
### Impact
Unauthenticated remote attackers can exhaust memory and cpu resource of sliver server and crash it when they have GzipEncoderID, which can be easily retrived from implant's http traffic, or by brute-forcing.
A fixed version is available at https://github.com/BishopFox/sliver/releases/tag/v1.7.2.
ghsa CVSS4.0
7.7
Vulnerability type
CWE-409
- https://github.com/BishopFox/sliver/security/advisories/GHSA-2phg-qgmm-r638
- https://github.com/BishopFox/sliver/commit/0cf5a47cfdf94b6ab481ec3ea0db09f31654c...
- https://github.com/BishopFox/sliver/releases/tag/v1.7.2
- https://pkg.go.dev/vuln/GO-2026-4548
- https://github.com/advisories/GHSA-2phg-qgmm-r638
Published: 25 Feb 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026