Логотип exploitDog
bind:CVE-2024-22189
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-22189

Количество 10

Количество 10

ubuntu логотип

CVE-2024-22189

почти 2 года назад

quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2024-22189

почти 2 года назад

quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2024-22189

почти 2 года назад

quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2024-22189

почти 2 года назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-22189

почти 2 года назад

quic-go is an implementation of the QUIC protocol in Go. Prior to vers ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-c33x-xqrf-c478

почти 2 года назад

QUIC's Connection ID Mechanism vulnerable to Memory Exhaustion Attack

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2024-03135

почти 2 года назад

Уязвимость реализации протокола QUIC библиотеки quic-go языка программирования go, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2024:0220-1

больше 1 года назад

Security update for caddy

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2024:0211-1

больше 1 года назад

Security update for caddy

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2024:0319-1

больше 1 года назад

Security update for coredns

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-22189

quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2024-22189

quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-22189

quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
msrc логотип
CVSS3: 7.5
0%
Низкий
почти 2 года назад
debian логотип
CVE-2024-22189

quic-go is an implementation of the QUIC protocol in Go. Prior to vers ...

CVSS3: 7.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-c33x-xqrf-c478

QUIC's Connection ID Mechanism vulnerable to Memory Exhaustion Attack

CVSS3: 7.5
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-03135

Уязвимость реализации протокола QUIC библиотеки quic-go языка программирования go, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
почти 2 года назад
suse-cvrf логотип
openSUSE-SU-2024:0220-1

Security update for caddy

больше 1 года назад
suse-cvrf логотип
openSUSE-SU-2024:0211-1

Security update for caddy

больше 1 года назад
suse-cvrf логотип
openSUSE-SU-2024:0319-1

Security update for coredns

больше 1 года назад

Уязвимостей на страницу