中危 HTTP/2 快速重置可能会导致 net/http 工作量过多 (CVE-2023-39325)
CVE编号
CVE-2023-39325利用情况
暂无补丁情况
官方补丁披露时间
2023-10-12漏洞描述
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | golang | go | * | From (including) 1.20.0 | Up to (excluding) 1.20.10 | ||||
运行在以下环境 | |||||||||
应用 | golang | go | * | From (including) 1.21.0 | Up to (excluding) 1.21.3 | ||||
运行在以下环境 | |||||||||
应用 | golang | http2 | * | Up to (excluding) 0.17.0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.18 | go | * | Up to (excluding) 1.20.10-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_edge | go | * | Up to (excluding) 1.21.3-r0 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2 | runc | * | Up to (excluding) 0.7.1-2.amzn2 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2023 | runc | * | Up to (excluding) 0.1.20200504git268e3bb.amzn2023.0.2 | |||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | golang | * | Up to (excluding) 1.20.10-1.48.amzn1 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | grafana | * | Up to (excluding) 1.19.13-1.0.1 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | golang-1.11 | * | Up to (including) 1.11.6-1+deb10u4 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | golang-1.15 | * | Up to (including) 1.15.15-1~deb11u4 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | golang-1.19 | * | Up to (including) 1.19.8-2 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | golang-1.19 | * | Up to (including) 1.19.13-1 | |||||
运行在以下环境 | |||||||||
系统 | fedoraproject | fedora | 37 | - | |||||
运行在以下环境 | |||||||||
系统 | fedoraproject | fedora | 38 | - | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | golang-docs | * | Up to (excluding) 1.20.10-3.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_38 | golang-docs | * | Up to (excluding) 1.20.10-2.fc38 | |||||
运行在以下环境 | |||||||||
系统 | fedora_39 | golang-docs | * | Up to (excluding) 1.21.3-1.fc39 | |||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | golang-docs | * | Up to (excluding) 1.19.13-1.el7 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 1.19.13-1.module+el8.8.0+21189+9e6e1f9f | |||||
运行在以下环境 | |||||||||
系统 | oracle_9 | oraclelinux-release | * | Up to (excluding) 1.19.13-1.el9_2 | |||||
运行在以下环境 | |||||||||
系统 | redhat_7 | rhc-worker-script | * | Up to (excluding) 0.5-1.el7_9 | |||||
运行在以下环境 | |||||||||
系统 | redhat_8 | grafana-debuginfo | * | Up to (excluding) 7.5.15-5.el8_8 | |||||
运行在以下环境 | |||||||||
系统 | redhat_9 | grafana-debuginfo | * | Up to (excluding) 1.19.13-1.el9_2 | |||||
运行在以下环境 | |||||||||
系统 | unionos_a | grafana | * | Up to (excluding) grafana-7.5.15-5.uelc20.01 | |||||
- 攻击路径 本地
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 越权影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-400 | 未加控制的资源消耗(资源穷尽) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论