Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-28182

Опубликовано: 03 апр. 2024
Источник: redhat
CVSS3: 5.3
EPSS Средний

Описание

nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.

A vulnerability was found in how nghttp2 implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up compute or memory resources to cause a Denial of Service.

Отчет

Red Hat rates the security impact of this vulnerability as Moderate, in alignment with upstream nghttp2. The worst case scenario is excessive CPU utilization causing a denial of service. Once an attack has ended, the system should return to normal operations on its own.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10nghttp2Not affected
Red Hat Enterprise Linux 10nodejs20Not affected
Red Hat Enterprise Linux 8nodejs:16/nodejsWill not fix
Red Hat JBoss Core Servicesnghttp2Affected
Red Hat Software Collectionshttpd24-nghttp2Will not fix
Red Hat Software Collectionsrh-nodejs14-nodejsWill not fix
JBoss Core Services for RHEL 8jbcs-httpd24-curlFixedRHSA-2024:269307.05.2024
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2024:269307.05.2024
JBoss Core Services for RHEL 8jbcs-httpd24-mod_http2FixedRHSA-2024:269307.05.2024
JBoss Core Services for RHEL 8jbcs-httpd24-mod_jkFixedRHSA-2024:269307.05.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-390

EPSS

Процентиль: 95%
0.18934
Средний

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 1 года назад

nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.

CVSS3: 5.3
nvd
около 1 года назад

nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.

CVSS3: 5.3
msrc
10 месяцев назад

Описание отсутствует

CVSS3: 5.3
debian
около 1 года назад

nghttp2 is an implementation of the Hypertext Transfer Protocol versio ...

suse-cvrf
около 1 года назад

Security update for nghttp2

EPSS

Процентиль: 95%
0.18934
Средний

5.3 Medium

CVSS3