HTTP/2 快速重置可能会导致 net/http 工作量过多 (CVE-2023-39325)

admin 2023-11-29 20:47:29 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 HTTP/2 快速重置可能会导致 net/http 工作量过多 (CVE-2023-39325)

CVE编号

CVE-2023-39325

利用情况

暂无

补丁情况

官方补丁

披露时间

2023-10-12
漏洞描述
A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://go.dev/cl/534215
https://go.dev/cl/534235
https://go.dev/issue/63417
https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://pkg.go.dev/vuln/GO-2023-2102
https://security.gentoo.org/glsa/202311-09
https://security.netapp.com/advisory/ntap-20231110-0008/
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 golang go * From (including) 1.20.0 Up to (excluding) 1.20.10
运行在以下环境
应用 golang go * From (including) 1.21.0 Up to (excluding) 1.21.3
运行在以下环境
应用 golang http2 * Up to (excluding) 0.17.0
运行在以下环境
系统 alpine_3.18 go * Up to (excluding) 1.20.10-r0
运行在以下环境
系统 alpine_edge go * Up to (excluding) 1.21.3-r0
运行在以下环境
系统 amazon_2 runc * Up to (excluding) 0.7.1-2.amzn2
运行在以下环境
系统 amazon_2023 runc * Up to (excluding) 0.1.20200504git268e3bb.amzn2023.0.2
运行在以下环境
系统 amazon_AMI golang * Up to (excluding) 1.20.10-1.48.amzn1
运行在以下环境
系统 anolis_os_8 grafana * Up to (excluding) 1.19.13-1.0.1
运行在以下环境
系统 debian_10 golang-1.11 * Up to (including) 1.11.6-1+deb10u4
运行在以下环境
系统 debian_11 golang-1.15 * Up to (including) 1.15.15-1~deb11u4
运行在以下环境
系统 debian_12 golang-1.19 * Up to (including) 1.19.8-2
运行在以下环境
系统 debian_sid golang-1.19 * Up to (including) 1.19.13-1
运行在以下环境
系统 fedoraproject fedora 37 -
运行在以下环境
系统 fedoraproject fedora 38 -
运行在以下环境
系统 fedora_37 golang-docs * Up to (excluding) 1.20.10-3.fc37
运行在以下环境
系统 fedora_38 golang-docs * Up to (excluding) 1.20.10-2.fc38
运行在以下环境
系统 fedora_39 golang-docs * Up to (excluding) 1.21.3-1.fc39
运行在以下环境
系统 fedora_EPEL_7 golang-docs * Up to (excluding) 1.19.13-1.el7
运行在以下环境
系统 oracle_8 oraclelinux-release * Up to (excluding) 1.19.13-1.module+el8.8.0+21189+9e6e1f9f
运行在以下环境
系统 oracle_9 oraclelinux-release * Up to (excluding) 1.19.13-1.el9_2
运行在以下环境
系统 redhat_7 rhc-worker-script * Up to (excluding) 0.5-1.el7_9
运行在以下环境
系统 redhat_8 grafana-debuginfo * Up to (excluding) 7.5.15-5.el8_8
运行在以下环境
系统 redhat_9 grafana-debuginfo * Up to (excluding) 1.19.13-1.el9_2
运行在以下环境
系统 unionos_a grafana * Up to (excluding) grafana-7.5.15-5.uelc20.01
阿里云评分 6.2
  • 攻击路径 本地
  • 攻击复杂度 复杂
  • 权限要求 普通权限
  • 影响范围 越权影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-400 未加控制的资源消耗(资源穷尽)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0