Логотип exploitDog
bind: "CVE-2024-39305"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-39305"

Количество 4

Количество 4

nvd логотип

CVE-2024-39305

12 месяцев назад

Envoy is a cloud-native, open source edge and service proxy. Prior to versions 1.30.4, 1.29.7, 1.28.5, and 1.27.7. Envoy references already freed memory when route hash policy is configured with cookie attributes. Note that this vulnerability has been fixed in the open as the effect would be immediately apparent if it was configured. Memory allocated for holding attribute values is freed after configuration was parsed. During request processing Envoy will attempt to copy content of de-allocated memory into request cookie header. This can lead to arbitrary content of Envoy's memory to be sent to the upstream service or abnormal process termination. This vulnerability is fixed in Envoy versions v1.30.4, v1.29.7, v1.28.5, and v1.27.7. As a workaround, do not use cookie attributes in route action hash policy.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2024-39305

12 месяцев назад

Envoy is a cloud-native, open source edge and service proxy. Prior to ...

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-06682

12 месяцев назад

Уязвимость модуля прокси-сервера Envoy, связанная с использованием памяти после освобождения, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
redos логотип

ROS-20240902-16

10 месяцев назад

Множественные уязвимости consul

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-39305

Envoy is a cloud-native, open source edge and service proxy. Prior to versions 1.30.4, 1.29.7, 1.28.5, and 1.27.7. Envoy references already freed memory when route hash policy is configured with cookie attributes. Note that this vulnerability has been fixed in the open as the effect would be immediately apparent if it was configured. Memory allocated for holding attribute values is freed after configuration was parsed. During request processing Envoy will attempt to copy content of de-allocated memory into request cookie header. This can lead to arbitrary content of Envoy's memory to be sent to the upstream service or abnormal process termination. This vulnerability is fixed in Envoy versions v1.30.4, v1.29.7, v1.28.5, and v1.27.7. As a workaround, do not use cookie attributes in route action hash policy.

CVSS3: 6.5
0%
Низкий
12 месяцев назад
debian логотип
CVE-2024-39305

Envoy is a cloud-native, open source edge and service proxy. Prior to ...

CVSS3: 6.5
0%
Низкий
12 месяцев назад
fstec логотип
BDU:2024-06682

Уязвимость модуля прокси-сервера Envoy, связанная с использованием памяти после освобождения, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании

CVSS3: 6.5
0%
Низкий
12 месяцев назад
redos логотип
ROS-20240902-16

Множественные уязвимости consul

CVSS3: 6.5
10 месяцев назад

Уязвимостей на страницу