Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-22189

Опубликовано: 04 апр. 2024
Источник: ubuntu
Приоритет: medium
CVSS3: 7.5

Описание

quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of NEW_CONNECTION_ID frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a RETIRE_CONNECTION_ID frame. The attacker can prevent the receiver from sending out (the vast majority of) these RETIRE_CONNECTION_ID frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.

РелизСтатусПримечание
devel

not-affected

0.38.2-1
esm-apps/jammy

needs-triage

esm-apps/noble

not-affected

0.38.2-1
esm-infra/focal

DNE

focal

DNE

jammy

needs-triage

mantic

ignored

end of life, was needs-triage
noble

not-affected

0.38.2-1
oracular

not-affected

0.38.2-1
plucky

not-affected

0.38.2-1

Показывать по

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 2 года назад

quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.

CVSS3: 7.5
nvd
почти 2 года назад

quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.

CVSS3: 7.5
msrc
почти 2 года назад

Описание отсутствует

CVSS3: 7.5
debian
почти 2 года назад

quic-go is an implementation of the QUIC protocol in Go. Prior to vers ...

CVSS3: 7.5
github
почти 2 года назад

QUIC's Connection ID Mechanism vulnerable to Memory Exhaustion Attack

7.5 High

CVSS3

Уязвимость CVE-2024-22189