Логотип exploitDog
bind: "CVE-2024-39305"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-39305"

Количество 4

Количество 4

nvd логотип

CVE-2024-39305

больше 1 года назад

Envoy is a cloud-native, open source edge and service proxy. Prior to versions 1.30.4, 1.29.7, 1.28.5, and 1.27.7. Envoy references already freed memory when route hash policy is configured with cookie attributes. Note that this vulnerability has been fixed in the open as the effect would be immediately apparent if it was configured. Memory allocated for holding attribute values is freed after configuration was parsed. During request processing Envoy will attempt to copy content of de-allocated memory into request cookie header. This can lead to arbitrary content of Envoy's memory to be sent to the upstream service or abnormal process termination. This vulnerability is fixed in Envoy versions v1.30.4, v1.29.7, v1.28.5, and v1.27.7. As a workaround, do not use cookie attributes in route action hash policy.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2024-39305

больше 1 года назад

Envoy is a cloud-native, open source edge and service proxy. Prior to ...

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-06682

больше 1 года назад

Уязвимость модуля прокси-сервера Envoy, связанная с использованием памяти после освобождения, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
redos логотип

ROS-20240902-16

около 1 года назад

Множественные уязвимости consul

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-39305

Envoy is a cloud-native, open source edge and service proxy. Prior to versions 1.30.4, 1.29.7, 1.28.5, and 1.27.7. Envoy references already freed memory when route hash policy is configured with cookie attributes. Note that this vulnerability has been fixed in the open as the effect would be immediately apparent if it was configured. Memory allocated for holding attribute values is freed after configuration was parsed. During request processing Envoy will attempt to copy content of de-allocated memory into request cookie header. This can lead to arbitrary content of Envoy's memory to be sent to the upstream service or abnormal process termination. This vulnerability is fixed in Envoy versions v1.30.4, v1.29.7, v1.28.5, and v1.27.7. As a workaround, do not use cookie attributes in route action hash policy.

CVSS3: 6.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-39305

Envoy is a cloud-native, open source edge and service proxy. Prior to ...

CVSS3: 6.5
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-06682

Уязвимость модуля прокси-сервера Envoy, связанная с использованием памяти после освобождения, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании

CVSS3: 6.5
0%
Низкий
больше 1 года назад
redos логотип
ROS-20240902-16

Множественные уязвимости consul

CVSS3: 6.5
около 1 года назад

Уязвимостей на страницу