Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-2758

Опубликовано: 03 апр. 2024
Источник: redhat

Описание

Tempesta FW rate limits are not enabled by default. They are either set too large to capture empty CONTINUATION frames attacks or too small to handle normal HTTP requests appropriately.

Отчет

Tempesta FW is an all-in-one open-source solution for high performance web content delivery and advanced protection against DDoS and web attacks. It is not shipped in any Red Hat product.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=2273367FW: HTTP/2 CONTINUATION frames can be utilized for DoS attacks

Связанные уязвимости

CVSS3: 6.3
nvd
почти 2 года назад

Tempesta FW rate limits are not enabled by default. They are either set too large to capture empty CONTINUATION frames attacks or too small to handle normal HTTP requests appropriately.

CVSS3: 6.3
github
почти 2 года назад

Tempesta FW rate limits are not enabled by default. They are either set too large to capture empty CONTINUATION frames attacks or too small to handle normal HTTP requests appropriately.

CVSS3: 5.3
fstec
почти 2 года назад

Уязвимость брандмауэра веб-приложений Tempesta, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании