NA

CVE-2023-45288

Published: 04/04/2024 Updated: 01/05/2024

Vulnerability Summary

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an malicious user to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an malicious user to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

Vulnerability Trend

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CERT/CC VU#421644: HTTP/2 CONTINUATION frames can be utilized for DoS attacks <!--X-Subject-Header-End--> <!--X-Head-of-Messag ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Envoy security releases [1293, 1282, 1274, 1268] are now available <!--X-Subject-Header-End--> <!--X-Head-of-Message-- ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Go 1222 and 1219 (CVE-2023-45288 HTTP/2 CONTINUATION issue) <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: J ...

Github Repositories

PoC to cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames

Envoy HTTP/2 CPU Exhaustion Vulnerability PoC This is a proof-of-concept (PoC) Python script designed to exploit the CPU exhaustion vulnerability in Envoy's HTTP/2 protocol stack This vulnerability affects Envoy versions prior to 1293, 1282, 1274, and 1268, allowing an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an exce

Recent Articles

New HTTP/2 DoS attack can crash web servers with a single connection
BleepingComputer • Bill Toulas • 04 Apr 2024

New HTTP/2 DoS attack can crash web servers with a single connection By Bill Toulas April 4, 2024 11:28 AM 0 Newly discovered HTTP/2 protocol vulnerabilities called "CONTINUATION Flood" can lead to denial of service (DoS) attacks, crashing web servers with a single TCP connection in some implementations. HTTP/2 is an update to the HTTP protocol standardized in 2015, designed to improve web performance by introducing binary framing for efficient data transmission, multiplexing to allow multiple r...