A vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises from the function's handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This vulnerability is triggered by a crafted input that causes the `idna.encode()` function to process the input with considerable computational load, significantly increasing the processing time in a quadratic manner relative to the input size.

Project Subscriptions

Vendors Products
Internationalized Domain Names In Applications Subscribe
Ansible Automation Platform Subscribe
Enterprise Linux Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Els Subscribe
Rhel Eus Subscribe
Rhel Tus Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3811-1 python-idna security update
EUVD EUVD EUVD-2024-0077 A vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises from the function's handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This vulnerability is triggered by a crafted input that causes the `idna.encode()` function to process the input with considerable computational load, significantly increasing the processing time in a quadratic manner relative to the input size.
Github GHSA Github GHSA GHSA-jjg7-2v4v-x38h Internationalized Domain Names in Applications (IDNA) vulnerable to denial of service from specially crafted inputs to idna.encode
Ubuntu USN Ubuntu USN USN-6780-1 idna vulnerability
Ubuntu USN Ubuntu USN USN-7762-1 pip vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 22:30:00 +0000


Tue, 04 Nov 2025 18:30:00 +0000


Tue, 04 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 13:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1333

Tue, 19 Aug 2025 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:kjd:internationalized_domain_names_in_applications:3.6:*:*:*:*:*:*:* cpe:2.3:a:kjd:internationalized_domain_names_in_applications:*:*:*:*:*:*:*:*

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00459}

epss

{'score': 0.00338}


Thu, 24 Oct 2024 02:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Els
CPEs cpe:/o:redhat:rhel_els:7
Vendors & Products Redhat rhel Els

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2025-11-04T22:06:20.751Z

Reserved: 2024-04-10T23:50:44.569Z

Link: CVE-2024-3651

cve-icon Vulnrichment

Updated: 2025-11-04T22:06:20.751Z

cve-icon NVD

Status : Modified

Published: 2024-07-07T18:15:09.827

Modified: 2025-11-04T22:16:02.477

Link: CVE-2024-3651

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-04-12T00:00:00Z

Links: CVE-2024-3651 - Bugzilla

cve-icon OpenCVE Enrichment

No data.