Denial of Service in h2oai/h2o-3
Description
In h2oai/h2o-3 version 3.46.0.2, a vulnerability exists where uploading and repeatedly parsing a large GZIP file can cause a denial of service. The server becomes unresponsive due to memory exhaustion and a large number of concurrent slow-running jobs. This issue arises from the improper handling of highly compressed data, leading to significant data amplification.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A denial-of-service vulnerability in H2O-3 3.46.0.2 allows remote attackers to exhaust server resources by uploading and repeatedly parsing a crafted large GZIP file.
Vulnerability
Overview
In h2oai/h2o-3 version 3.46.0.2, a denial-of-service (DoS) vulnerability exists in the parsing of GZIP-compressed data files. The root cause is improper handling of highly compressed data, leading to significant data amplification when a GZIP file is uploaded and parsed repeatedly [1][2]. This flaw is located within the parsing logic, specifically in the ParseDataset.java file, where the server does not limit the expansion ratio of compressed input [3].
Attack
Vector and Exploitation
An attacker can exploit this vulnerability without authentication by uploading a specially crafted, highly compressed GZIP file to the H2O-3 server. By repeatedly triggering the parsing of this file, the attacker causes the server to allocate excessive memory and spawn a large number of concurrent slow-running jobs [1][2]. These jobs consume system resources, eventually causing the server to become unresponsive to legitimate requests.
Impact
Successful exploitation results in a complete denial of service. The H2O-3 server becomes unresponsive due to memory exhaustion and the accumulation of many slow-running parser jobs, effectively halting all machine learning and data processing tasks on that instance [1][2]. No data confidentiality or integrity is compromised, but the availability of the service is severely degraded.
Mitigation
As of publication, a fix for CVE-2024-7765 has not been released in a public advisory from H2O.ai [1]. Users are advised to monitor the H2O-3 repository for patch updates and, in the interim, restrict network access to the H2O-3 server and avoid exposing the parsing interface to untrusted users or the internet.
- GitHub - h2oai/h2o-3: H2O is an Open Source, Distributed, Fast & Scalable Machine Learning Platform: Deep Learning, Gradient Boosting (GBM) & XGBoost, Random Forest, Generalized Linear Modeling (GLM with Elastic Net), K-Means, PCA, Generalized Additive Models (GAM), RuleFit, Support Vector Machine (SVM), Stacked Ensembles, Automatic Machine Learning (AutoML), etc.
- NVD - CVE-2024-7765
- h2o-3/h2o-core/src/main/java/water/parser/ParseDataset.java at 7d418fa19d3ab434f742818e37f891bef9102c97 · h2oai/h2o-3
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
h2oPyPI | >= 3.32.1.2, <= 3.46.0.2 | — |
ai.h2o:h2o-coreMaven | >= 3.32.1.2, <= 3.46.0.2 | — |
Affected products
4- ghsa-coords2 versions
>= 3.32.1.2, <= 3.46.0.2+ 1 more
- (no CPE)range: >= 3.32.1.2, <= 3.46.0.2
- (no CPE)range: >= 3.32.1.2, <= 3.46.0.2
- h2oai/h2oai/h2o-3v5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.