[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Rapid Reset Attack Vulnerability - CVE-2023-44487

Deprecated
ID: oval:org.secpod.oval:def:93807Date: (C)2023-10-13   (M)2024-04-29
Class: VULNERABILITYFamily: unix




A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as 'Important' as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.

Platform:
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 8
Red Hat Enterprise Linux 9
Product:
butane
containernetworking-plugins
git-lfs
golang
grafana
grafana-pcp
ignition
nodejs
pki-servlet-engine
tomcat
toolbox
varnish
weldr-client
libnghttp2
nginx
osbuild-composer
dotnet-sdk-6.0
dotnet-sdk-7.0
dotnet-runtime-6.0
dotnet-runtime-7.0
haproxy
Reference:
CVE-2023-44487
CVE    1
CVE-2023-44487

© SecPod Technologies