Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-2653

Опубликовано: 03 апр. 2024
Источник: debian
EPSS Низкий

Описание

amphp/http will collect CONTINUATION frames in an unbounded buffer and will not check a limit until it has received the set END_HEADERS flag, resulting in an OOM crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php-amphp-httpitppackage
php-amphp-http-clientitppackage

Примечания

  • https://github.com/amphp/http/security/advisories/GHSA-qjfw-cvjf-f4fm

  • https://github.com/amphp/http-client/security/advisories/GHSA-w8gf-g2vq-j2f4

EPSS

Процентиль: 88%
0.03936
Низкий

Связанные уязвимости

CVSS3: 7.5
redhat
почти 2 года назад

amphp/http will collect CONTINUATION frames in an unbounded buffer and will not check a limit until it has received the set END_HEADERS flag, resulting in an OOM crash.

CVSS3: 8.2
nvd
почти 2 года назад

amphp/http will collect CONTINUATION frames in an unbounded buffer and will not check a limit until it has received the set END_HEADERS flag, resulting in an OOM crash.

CVSS3: 8.2
github
почти 2 года назад

AMPHP Denial of Service via HTTP/2 CONTINUATION Frames

CVSS3: 8.2
fstec
около 2 лет назад

Уязвимость библиотеки amphp/http и HTTP-клиента amphp/http-client, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 88%
0.03936
Низкий