Логотип exploitDog
bind:CVE-2025-7054
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-7054

Количество 4

Количество 4

nvd логотип

CVE-2025-7054

6 месяцев назад

Cloudflare quiche was discovered to be vulnerable to an infinite loop when sending packets containing RETIRE_CONNECTION_ID frames. QUIC connections possess a set of connection identifiers (IDs); see Section 5.1 of RFC 9000 https://datatracker.ietf.org/doc/html/rfc9000#section-5.1 . Once the QUIC handshake completes, a local endpoint is responsible for issuing and retiring Connection IDs that are used by the remote peer to populate the Destination Connection ID field in packets sent from remote to local. Each Connection ID has a sequence number to ensure synchronization between peers. An unauthenticated remote attacker can exploit this vulnerability by first completing a handshake and then sending a specially-crafted set of frames that trigger a connection ID retirement in the victim. When the victim attempts to send a packet containing RETIRE_CONNECTION_ID frames, Section 19.16 of RFC 9000 https://datatracker.ietf.org/doc/html/rfc9000#section-19.6 requires that the sequence number

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2025-7054

6 месяцев назад

Cloudflare quiche was discovered to be vulnerable to an infinite loop ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-m3hh-f9gh-74c2

6 месяцев назад

quiche connection ID retirement can trigger an infinite loop

EPSS: Низкий
fstec логотип

BDU:2025-10362

6 месяцев назад

Уязвимость программного обеспечения реализации транспортного протокола QUIC и HTTP/3 CloudFlare Quiche, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-7054

Cloudflare quiche was discovered to be vulnerable to an infinite loop when sending packets containing RETIRE_CONNECTION_ID frames. QUIC connections possess a set of connection identifiers (IDs); see Section 5.1 of RFC 9000 https://datatracker.ietf.org/doc/html/rfc9000#section-5.1 . Once the QUIC handshake completes, a local endpoint is responsible for issuing and retiring Connection IDs that are used by the remote peer to populate the Destination Connection ID field in packets sent from remote to local. Each Connection ID has a sequence number to ensure synchronization between peers. An unauthenticated remote attacker can exploit this vulnerability by first completing a handshake and then sending a specially-crafted set of frames that trigger a connection ID retirement in the victim. When the victim attempts to send a packet containing RETIRE_CONNECTION_ID frames, Section 19.16 of RFC 9000 https://datatracker.ietf.org/doc/html/rfc9000#section-19.6 requires that the sequence number

CVSS3: 6.5
0%
Низкий
6 месяцев назад
debian логотип
CVE-2025-7054

Cloudflare quiche was discovered to be vulnerable to an infinite loop ...

CVSS3: 6.5
0%
Низкий
6 месяцев назад
github логотип
GHSA-m3hh-f9gh-74c2

quiche connection ID retirement can trigger an infinite loop

0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-10362

Уязвимость программного обеспечения реализации транспортного протокола QUIC и HTTP/3 CloudFlare Quiche, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
6 месяцев назад

Уязвимостей на страницу