Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qjfw-cvjf-f4fm

Опубликовано: 03 апр. 2024
Источник: github
Github: Прошло ревью
CVSS3: 8.2

Описание

AMPHP Denial of Service via HTTP/2 CONTINUATION Frames

amphp/http will collect HTTP/2 CONTINUATION frames in an unbounded buffer and will not check the header size limit until it has received the END_HEADERS flag, resulting in an OOM crash. amphp/http-client and amphp/http-server are indirectly affected if they're used with an unpatched version of amphp/http. Early versions of amphp/http-client with HTTP/2 support (v4.0.0-rc10 to 4.0.0) are also directly affected.

Acknowledgements

Thank you to Bartek Nowotarski for reporting the vulnerability.

Пакеты

Наименование

amphp/http

composer
Затронутые версииВерсия исправления

>= 2.0.0, <= 2.1.0

2.1.1

Наименование

amphp/http

composer
Затронутые версииВерсия исправления

<= 1.7.2

1.7.3

Наименование

amphp/http-client

composer
Затронутые версииВерсия исправления

>= 4.0.0-rc10, <= 4.0.0

Отсутствует

EPSS

Процентиль: 88%
0.03936
Низкий

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 2 года назад

amphp/http will collect CONTINUATION frames in an unbounded buffer and will not check a limit until it has received the set END_HEADERS flag, resulting in an OOM crash.

CVSS3: 8.2
nvd
почти 2 года назад

amphp/http will collect CONTINUATION frames in an unbounded buffer and will not check a limit until it has received the set END_HEADERS flag, resulting in an OOM crash.

CVSS3: 8.2
debian
почти 2 года назад

amphp/http will collect CONTINUATION frames in an unbounded buffer and ...

CVSS3: 8.2
fstec
около 2 лет назад

Уязвимость библиотеки amphp/http и HTTP-клиента amphp/http-client, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 88%
0.03936
Низкий

8.2 High

CVSS3