Описание
io.netty:netty-codec-http2 vulnerable to HTTP/2 Rapid Reset Attack
A client might overload the server by issue frequent RST frames. This can cause a massive amount of load on the remote system and so cause a DDOS attack.
Impact
This is a DDOS attack, any http2 server is affected and so you should update as soon as possible.
Patches
This is patched in version 4.1.100.Final.
Workarounds
A user can limit the amount of RST frames that are accepted per connection over a timeframe manually using either an own Http2FrameListener implementation or an ChannelInboundHandler implementation (depending which http2 API is used).
References
Ссылки
- https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3
- https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p
- https://nvd.nist.gov/vuln/detail/CVE-2023-44487
- https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61
- https://www.cve.org/CVERecord?id=CVE-2023-44487
Пакеты
Наименование
io.netty:netty-codec-http2
maven
Затронутые версииВерсия исправления
< 4.1.100.Final
4.1.100.Final
7.5 High
CVSS3
Дефекты
CWE-400
7.5 High
CVSS3
Дефекты
CWE-400