Логотип exploitDog
bind:"CVE-2024-7246"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-7246"

Количество 11

Количество 11

ubuntu логотип

CVE-2024-7246

больше 1 года назад

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2024-7246

больше 1 года назад

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

CVSS3: 4.8
EPSS: Низкий
nvd логотип

CVE-2024-7246

больше 1 года назад

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2024-7246

3 месяца назад

HPACK table poisoning in gRPC C++, Python & Ruby

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2024-7246

больше 1 года назад

It's possible for a gRPC client communicating with a HTTP/2 proxy to p ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-ghwg-gpp4-w4x3

больше 1 года назад

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4436-1

11 месяцев назад

Security update for grpc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4429-1

11 месяцев назад

Security update for python-grpcio

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4428-1

11 месяцев назад

Security update for python-grpcio

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4401-1

11 месяцев назад

Security update for grpc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4393-1

11 месяцев назад

Security update for python-grpcio

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-7246

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-7246

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

CVSS3: 4.8
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-7246

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
msrc логотип
CVE-2024-7246

HPACK table poisoning in gRPC C++, Python & Ruby

CVSS3: 5.3
0%
Низкий
3 месяца назад
debian логотип
CVE-2024-7246

It's possible for a gRPC client communicating with a HTTP/2 proxy to p ...

CVSS3: 5.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-ghwg-gpp4-w4x3

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:4436-1

Security update for grpc

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4429-1

Security update for python-grpcio

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4428-1

Security update for python-grpcio

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4401-1

Security update for grpc

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4393-1

Security update for python-grpcio

11 месяцев назад

Уязвимостей на страницу