Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-27316

Опубликовано: 03 апр. 2024
Источник: redhat
CVSS3: 7.5
EPSS Критический

Описание

HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.

A vulnerability was found in how Apache httpd implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up memory resources to cause a Denial of Service.

Отчет

Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream Apache. The worst case scenario is memory exhaustion causing a denial of service. Once an attack has ended, the system should return to normal operations on its own. This vulnerability stems from an imperfect definition of the HTTP/2 protocol. As the httpd component is widely utilized across nearly every major Red Hat offering, a full listing of impacted packages will not be provided. Therefore, the “Affected Packages and Issued Red Hat Security Errata” section contains a simplified list of what offerings need to remediate this vulnerability. Every impacted offering has at least one representative component listed, but potentially not all of them.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2HTTP-2Affected
Cryostat 2HTTP-2Affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-rhel8-operatorNot affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/fluentd-rhel8Not affected
Migration Toolkit for Applications 6HTTP-2Will not fix
Migration Toolkit for RuntimesHTTP-2Affected
Multicluster Engine for Kubernetesmulticluster-engine/console-mce-rhel8Not affected
.NET 6.0 on Red Hat Enterprise Linuxrh-dotnet60-dotnetAffected
OpenShift Developer Tools and ServicesjenkinsWill not fix
OpenShift ServerlessHTTP-2Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400

EPSS

Процентиль: 100%
0.90356
Критический

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.

CVSS3: 7.5
nvd
около 1 года назад

HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.

CVSS3: 7.5
msrc
около 1 года назад

Описание отсутствует

CVSS3: 7.5
debian
около 1 года назад

HTTP/2 incoming headers exceeding the limit are temporarily buffered i ...

rocky
около 1 года назад

Moderate: mod_http2 security update

EPSS

Процентиль: 100%
0.90356
Критический

7.5 High

CVSS3