VYPR
High severityNVD Advisory· Published Mar 20, 2025· Updated Mar 20, 2025

Denial of Service in h2oai/h2o-3

CVE-2024-7765

Description

In h2oai/h2o-3 version 3.46.0.2, a vulnerability exists where uploading and repeatedly parsing a large GZIP file can cause a denial of service. The server becomes unresponsive due to memory exhaustion and a large number of concurrent slow-running jobs. This issue arises from the improper handling of highly compressed data, leading to significant data amplification.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A denial-of-service vulnerability in H2O-3 3.46.0.2 allows remote attackers to exhaust server resources by uploading and repeatedly parsing a crafted large GZIP file.

Vulnerability

Overview

In h2oai/h2o-3 version 3.46.0.2, a denial-of-service (DoS) vulnerability exists in the parsing of GZIP-compressed data files. The root cause is improper handling of highly compressed data, leading to significant data amplification when a GZIP file is uploaded and parsed repeatedly [1][2]. This flaw is located within the parsing logic, specifically in the ParseDataset.java file, where the server does not limit the expansion ratio of compressed input [3].

Attack

Vector and Exploitation

An attacker can exploit this vulnerability without authentication by uploading a specially crafted, highly compressed GZIP file to the H2O-3 server. By repeatedly triggering the parsing of this file, the attacker causes the server to allocate excessive memory and spawn a large number of concurrent slow-running jobs [1][2]. These jobs consume system resources, eventually causing the server to become unresponsive to legitimate requests.

Impact

Successful exploitation results in a complete denial of service. The H2O-3 server becomes unresponsive due to memory exhaustion and the accumulation of many slow-running parser jobs, effectively halting all machine learning and data processing tasks on that instance [1][2]. No data confidentiality or integrity is compromised, but the availability of the service is severely degraded.

Mitigation

As of publication, a fix for CVE-2024-7765 has not been released in a public advisory from H2O.ai [1]. Users are advised to monitor the H2O-3 repository for patch updates and, in the interim, restrict network access to the H2O-3 server and avoid exposing the parsing interface to untrusted users or the internet.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
h2oPyPI
>= 3.32.1.2, <= 3.46.0.2
ai.h2o:h2o-coreMaven
>= 3.32.1.2, <= 3.46.0.2

Affected products

4
  • H2oai/H2o 3llm-fuzzy
    Range: =3.46.0.2
  • ghsa-coords2 versions
    >= 3.32.1.2, <= 3.46.0.2+ 1 more
    • (no CPE)range: >= 3.32.1.2, <= 3.46.0.2
    • (no CPE)range: >= 3.32.1.2, <= 3.46.0.2
  • h2oai/h2oai/h2o-3v5
    Range: unspecified

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.