Rapid Reset Attack Vulnerability - CVE-2023-44487Deprecated |
ID: oval:org.secpod.oval:def:93807 | Date: (C)2023-10-13 (M)2024-04-29 |
Class: VULNERABILITY | Family: unix |
A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as 'Important' as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.
Platform: |
Red Hat Enterprise Linux 7 |
Red Hat Enterprise Linux 8 |
Red Hat Enterprise Linux 9 |
Product: |
butane |
containernetworking-plugins |
git-lfs |
golang |
grafana |
grafana-pcp |
ignition |
nodejs |
pki-servlet-engine |
tomcat |
toolbox |
varnish |
weldr-client |
libnghttp2 |
nginx |
osbuild-composer |
dotnet-sdk-6.0 |
dotnet-sdk-7.0 |
dotnet-runtime-6.0 |
dotnet-runtime-7.0 |
haproxy |