Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-32778

Опубликовано: 24 авг. 2021
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy’s procedure for resetting a HTTP/2 stream has O(N^2) complexity, leading to high CPU utilization when a large number of streams are reset. Deployments are susceptible to Denial of Service when Envoy is configured with high limit on H/2 concurrent streams. An attacker wishing to exploit this vulnerability would require a client opening and closing a large number of H/2 streams. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes to reduce time complexity of resetting HTTP/2 streams. As a workaround users may limit the number of simultaneous HTTP/2 dreams for upstream and downstream peers to a low number, i.e. 100.

An uncontrolled resource consumption vulnerability was found in envoyproxy/envoy. When envoy handles a large number of HTTP/2 requests which open and then reset the connection, it can cause excessive CPU usage. This flaw allows an attacker to cause a denial of service on the proxy. The highest threat from this vulnerability is to system availability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 1servicemesh-proxyAffected
OpenShift Service Mesh 2.0servicemesh-proxyAffected
OpenShift Service Mesh 2.1servicemeshFixedRHEA-2021:405102.11.2021
OpenShift Service Mesh 2.1servicemesh-grafanaFixedRHEA-2021:405102.11.2021
OpenShift Service Mesh 2.1servicemesh-operatorFixedRHEA-2021:405102.11.2021
OpenShift Service Mesh 2.1servicemesh-prometheusFixedRHEA-2021:405102.11.2021
OpenShift Service Mesh 2.1servicemesh-proxyFixedRHEA-2021:405102.11.2021
OpenShift Service Mesh 2.1servicemesh-ratelimitFixedRHEA-2021:405102.11.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1996946envoyproxy/envoy: excessive CPU usage when handling a large number of HTTP/2 requests

EPSS

Процентиль: 22%
0.0007
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.8
nvd
почти 4 года назад

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy’s procedure for resetting a HTTP/2 stream has O(N^2) complexity, leading to high CPU utilization when a large number of streams are reset. Deployments are susceptible to Denial of Service when Envoy is configured with high limit on H/2 concurrent streams. An attacker wishing to exploit this vulnerability would require a client opening and closing a large number of H/2 streams. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes to reduce time complexity of resetting HTTP/2 streams. As a workaround users may limit the number of simultaneous HTTP/2 dreams for upstream and downstream peers to a low number, i.e. 100.

CVSS3: 5.8
debian
почти 4 года назад

Envoy is an open source L7 proxy and communication bus designed for la ...

oracle-oval
больше 3 лет назад

ELSA-2021-9525: olcne security update (IMPORTANT)

oracle-oval
больше 3 лет назад

ELSA-2021-9546: olcne istio istio kubernetes security update (IMPORTANT)

oracle-oval
больше 3 лет назад

ELSA-2021-9526: olcne security update (IMPORTANT)

EPSS

Процентиль: 22%
0.0007
Низкий

7.5 High

CVSS3