Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-30156

Опубликовано: 24 мар. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Varnish Cache before 7.3.2 and 7.4.x before 7.4.3 (and before 6.0.13 LTS), and Varnish Enterprise 6 before 6.0.12r6, allows credits exhaustion for an HTTP/2 connection control flow window, aka a Broke Window Attack.

A flaw was found in the Varnish cache server, with HTTP/2 support enabled, that may allow a Denial of Service type of attack. A malicious actor can cause the server to run out of credits during the HTTP/2 connection control flow. As a consequence, the server will stop to properly process the active HTTP streams, retaining the already allocated resources, leading to resource starvation.

Отчет

CVE-2024-30156 represents a important severity issue due to its potential to cause widespread denial of service (DoS) across Varnish Cacher servers with HTTP/2 protocol enabled. By exploiting this vulnerability, attackers can exhaust the server's HTTP/2 connection control flow window credits, thereby halting the processing of streams and indefinitely retaining associated resources. This can lead to a complete service outage, impacting the availability and performance of web services relying on Varnish Cache. Given the prevalence of HTTP/2 adoption for its performance benefits, the vulnerability poses a significant risk to web infrastructure, necessitating immediate mitigation measures to prevent exploitation and mitigate the impact on affected systems.

Меры по смягчению последствий

A possible mitigation for this issue is to disable http2 support until the package can be updated. This can be performed by running the following command:

varnishadm param.set feature -http2

Note: you must remove h2 from the list of protocols if your TLS terminator is advertising it with ALPN. It's also possible to use the MAIN.sc_bankrupt counter to monitor possible on-going attacks to the varnish server.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10varnishNot affected
Red Hat Enterprise Linux 10varnish-modulesNot affected
Red Hat Enterprise Linux 9varnish-modulesNot affected
Red Hat Software Collectionsrh-varnish6-jemallocNot affected
Red Hat Enterprise Linux 8varnishFixedRHSA-2024:169008.04.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportvarnishFixedRHSA-2024:493731.07.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportvarnishFixedRHSA-2024:293821.05.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicevarnishFixedRHSA-2024:293821.05.2024
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsvarnishFixedRHSA-2024:293821.05.2024
Red Hat Enterprise Linux 8.6 Extended Update SupportvarnishFixedRHSA-2024:342628.05.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2271486varnish: HTTP/2 Broken Window Attack may result in denial of service

EPSS

Процентиль: 22%
0.00071
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

Varnish Cache before 7.3.2 and 7.4.x before 7.4.3 (and before 6.0.13 LTS), and Varnish Enterprise 6 before 6.0.12r6, allows credits exhaustion for an HTTP/2 connection control flow window, aka a Broke Window Attack.

CVSS3: 7.5
nvd
около 1 года назад

Varnish Cache before 7.3.2 and 7.4.x before 7.4.3 (and before 6.0.13 LTS), and Varnish Enterprise 6 before 6.0.12r6, allows credits exhaustion for an HTTP/2 connection control flow window, aka a Broke Window Attack.

CVSS3: 7.5
debian
около 1 года назад

Varnish Cache before 7.3.2 and 7.4.x before 7.4.3 (and before 6.0.13 L ...

rocky
около 1 года назад

Important: varnish security update

CVSS3: 7.5
github
около 1 года назад

Varnish Cache before 7.3.2 and 7.4.x before 7.4.3 (and before 6.0.13 LTS), and Varnish Enterprise 6 before 6.0.12r6, allows credits exhaustion for an HTTP/2 connection control flow window, aka a Broke Window Attack.

EPSS

Процентиль: 22%
0.00071
Низкий

7.5 High

CVSS3