445
VMScore

CVE-2022-30591

Published: 06/07/2022 Updated: 11/04/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

quic-go up to and including 0.27.0 allows remote malicious users to cause a denial of service (CPU consumption) via a Slowloris variant in which incomplete QUIC or HTTP/3 requests are sent. This occurs because mtu_discoverer.go misparses the MTU Discovery service and consequently overflows the probe timer. NOTE: the vendor's position is that this behavior should not be listed as a vulnerability on the CVE List

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

quic-go project quic-go

Github Repositories

Attacks against QUIC (CVE-2022-30591)

QUIC-attacks (CVE-2022-30591) The current repository serves the purpose of sharing the scripts we used for educational usage These attacks were a part of our study (check here), and were tested against 6 different QUIC-enabled servers (IIS, NGINX, LiteSpeed, Cloudflare, H2O, and Caddy) The quic-loris script is the exploit of the CVE-2022-30591 issue that affected quic-go libr