Логотип exploitDog
bind:CVE-2022-24666
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-24666

Количество 2

Количество 2

nvd логотип

CVE-2022-24666

почти 4 года назад

A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted HTTP/2 frame. This attack affects all swift-nio-http2 versions from 1.0.0 to 1.19.1. This vulnerability is caused by a logical error when parsing a HTTP/2 HEADERS frame where the frame contains priority information without any other data. This logical error caused confusion about the size of the frame, leading to a parsing error. This parsing error immediately crashes the entire process. Sending a HEADERS frame with HTTP/2 priority information does not require any special permission, so any HTTP/2 connection peer may send such a frame. For clients, this means any server to which they connect may launch this attack. For servers, anyone they allow to connect to them may launch such an attack. The attack is low-effort: it takes very little resources to send an appropriately crafted frame. The impact on availability is high: receiving the frame immediately crash

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-ccw9-q5h2-8c2w

больше 2 лет назад

swift-nio-http2 vulnerable to denial of service via invalid HTTP/2 HEADERS frame length

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-24666

A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted HTTP/2 frame. This attack affects all swift-nio-http2 versions from 1.0.0 to 1.19.1. This vulnerability is caused by a logical error when parsing a HTTP/2 HEADERS frame where the frame contains priority information without any other data. This logical error caused confusion about the size of the frame, leading to a parsing error. This parsing error immediately crashes the entire process. Sending a HEADERS frame with HTTP/2 priority information does not require any special permission, so any HTTP/2 connection peer may send such a frame. For clients, this means any server to which they connect may launch this attack. For servers, anyone they allow to connect to them may launch such an attack. The attack is low-effort: it takes very little resources to send an appropriately crafted frame. The impact on availability is high: receiving the frame immediately crash

CVSS3: 7.5
3%
Низкий
почти 4 года назад
github логотип
GHSA-ccw9-q5h2-8c2w

swift-nio-http2 vulnerable to denial of service via invalid HTTP/2 HEADERS frame length

CVSS3: 7.5
3%
Низкий
больше 2 лет назад

Уязвимостей на страницу