Логотип exploitDog
bind:"CVE-2023-39325" OR bind:"CVE-2023-29409" OR bind:"CVE-2023-44487"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-39325" OR bind:"CVE-2023-29409" OR bind:"CVE-2023-44487"

Количество 132

Количество 132

redos логотип

ROS-20240826-01

больше 1 года назад

Множественные уязвимости packer

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-39325

больше 2 лет назад

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s...

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-39325

больше 2 лет назад

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-39325

больше 2 лет назад

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-39325

около 1 года назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-39325

больше 2 лет назад

A malicious HTTP/2 client which rapidly creates requests and immediate ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3343-1

больше 1 года назад

Security update for kubernetes1.24

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3341-1

больше 1 года назад

Security update for kubernetes1.23

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4469-1

около 2 лет назад

Security update for go1.21-openssl

EPSS: Низкий
github логотип

GHSA-4374-p667-p6c8

больше 2 лет назад

HTTP/2 rapid reset can cause excessive work in net/http

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-07013

больше 2 лет назад

Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20250822-12

6 месяцев назад

Уязвимость stolon

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-29409

больше 2 лет назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-29409

больше 2 лет назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-29409

больше 2 лет назад

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2023-29409

5 месяцев назад

Large RSA keys can cause high CPU usage in crypto/tls

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-29409

больше 2 лет назад

Extremely large RSA keys in certificate chains can cause a client/serv ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2023-44487

больше 2 лет назад

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

CVSS3: 7.5
EPSS: Критический
redhat логотип

CVE-2023-44487

больше 2 лет назад

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

CVSS3: 7.5
EPSS: Критический
nvd логотип

CVE-2023-44487

больше 2 лет назад

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

CVSS3: 7.5
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redos логотип
ROS-20240826-01

Множественные уязвимости packer

CVSS3: 7.5
больше 1 года назад
ubuntu логотип
CVE-2023-39325

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s...

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-39325

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; s...

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-39325

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 7.5
0%
Низкий
около 1 года назад
debian логотип
CVE-2023-39325

A malicious HTTP/2 client which rapidly creates requests and immediate ...

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:3343-1

Security update for kubernetes1.24

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3341-1

Security update for kubernetes1.23

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4469-1

Security update for go1.21-openssl

около 2 лет назад
github логотип
GHSA-4374-p667-p6c8

HTTP/2 rapid reset can cause excessive work in net/http

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-07013

Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
redos логотип
ROS-20250822-12

Уязвимость stolon

CVSS3: 7.5
0%
Низкий
6 месяцев назад
ubuntu логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
msrc логотип
CVE-2023-29409

Large RSA keys can cause high CPU usage in crypto/tls

CVSS3: 5.3
0%
Низкий
5 месяцев назад
debian логотип
CVE-2023-29409

Extremely large RSA keys in certificate chains can cause a client/serv ...

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

CVSS3: 7.5
94%
Критический
больше 2 лет назад
redhat логотип
CVE-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

CVSS3: 7.5
94%
Критический
больше 2 лет назад
nvd логотип
CVE-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

CVSS3: 7.5
94%
Критический
больше 2 лет назад

Уязвимостей на страницу