Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-27983

Опубликовано: 03 апр. 2024
Источник: redhat
CVSS3: 7.5
EPSS Средний

Описание

An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.

A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.

Отчет

Red Hat rates the security impact of this vulnerability as Important due to the worst-case scenario resulting in a denial of service, in alignment with the upstream Node.js project. It is simple to exploit, could significantly impact availability, and there is no reasonable mitigation. Once an attack has ended, the system should return to normal operations on its own.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8nodejs:16/nodejsAffected
Red Hat Enterprise Linux 8nodejsFixedRHSA-2024:277809.05.2024
Red Hat Enterprise Linux 8nodejsFixedRHSA-2024:278009.05.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportnodejsFixedRHSA-2024:355303.06.2024
Red Hat Enterprise Linux 8.6 Telecommunications Update ServicenodejsFixedRHSA-2024:355303.06.2024
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsnodejsFixedRHSA-2024:355303.06.2024
Red Hat Enterprise Linux 8.8 Extended Update SupportnodejsFixedRHSA-2024:435308.07.2024
Red Hat Enterprise Linux 8.8 Extended Update SupportnodejsFixedRHSA-2024:482424.07.2024
Red Hat Enterprise Linux 9nodejsFixedRHSA-2024:277909.05.2024
Red Hat Enterprise Linux 9nodejsFixedRHSA-2024:285315.05.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-400

EPSS

Процентиль: 99%
0.6865
Средний

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
ubuntu
около 1 года назад

An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.

CVSS3: 8.2
nvd
около 1 года назад

An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.

CVSS3: 8.2
msrc
около 1 года назад

Описание отсутствует

CVSS3: 8.2
debian
около 1 года назад

An attacker can make the Node.js HTTP/2 server completely unavailable ...

CVSS3: 8.2
github
около 1 года назад

An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.

EPSS

Процентиль: 99%
0.6865
Средний

7.5 High

CVSS3