NA

CVE-2023-45288

Published: 04/04/2024 Updated: 01/05/2024

Vulnerability Summary

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an malicious user to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an malicious user to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

Vulnerability Trend

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CERT/CC VU#421644: HTTP/2 CONTINUATION frames can be utilized for DoS attacks <!--X-Subject-Header-End--> <!--X-Head-of-Messag ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Envoy security releases [1293, 1282, 1274, 1268] are now available <!--X-Subject-Header-End--> <!--X-Head-of-Message-- ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Go 1222 and 1219 (CVE-2023-45288 HTTP/2 CONTINUATION issue) <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: J ...

Github Repositories

PoC to cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames

Envoy HTTP/2 CPU Exhaustion Vulnerability PoC This is a proof-of-concept (PoC) Python script designed to exploit the CPU exhaustion vulnerability in Envoy's HTTP/2 protocol stack This vulnerability affects Envoy versions prior to 1293, 1282, 1274, and 1268, allowing an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an exce

A package manager for Go

gpm - A package manager in and for Go Table of contents Overview Installation Linux / UNIX MacOS Windows Build from source Usage Commands Add alias Add project Audit dependencies Build and install executable Build project Checkout branch Cleanup project Execute shell command Import aliases Import projects Install dependencies List aliases List executables List proj

Recent Articles

New HTTP/2 DoS attack can crash web servers with a single connection
BleepingComputer • Bill Toulas • 04 Apr 2024

New HTTP/2 DoS attack can crash web servers with a single connection By Bill Toulas April 4, 2024 11:28 AM 0 Newly discovered HTTP/2 protocol vulnerabilities called "CONTINUATION Flood" can lead to denial of service (DoS) attacks, crashing web servers with a single TCP connection in some implementations. HTTP/2 is an update to the HTTP protocol standardized in 2015, designed to improve web performance by introducing binary framing for efficient data transmission, multiplexing to allow multiple r...