跳转到帖子

Red Hat JBossEAP: Uncontrolled Resource Consumption (CVE-2023-44487)

recommended_posts

发布于
  • Members

Red Hat JBossEAP: Uncontrolled Resource Consumption (CVE-2023-44487)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
10/10/2023
Created
09/20/2024
Added
09/19/2024
Modified
12/20/2024

Description

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.. A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as 'Important' as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit. CVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages. Security Bulletin https://access.redhat.com/security/vulnerabilities/RHSB-2023-003

Solution(s)

  • red-hat-jboss-eap-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2023-44487
  • CVE - 2023-44487
  • https://access.redhat.com/security/cve/CVE-2023-44487
  • https://bugzilla.redhat.com/show_bug.cgi?id=2242803
  • https://github.com/dotnet/announcements/issues/277
  • https://pkg.go.dev/vuln/GO-2023-2102
  • https://www.cisa.gov/known-exploited-vulnerabilities-catalog
  • https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487
  • https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/
  • https://access.redhat.com/errata/RHSA-2023:5920
  • https://access.redhat.com/errata/RHSA-2023:5922
  • https://access.redhat.com/errata/RHSA-2023:7637
  • https://access.redhat.com/errata/RHSA-2023:7638
  • https://access.redhat.com/errata/RHSA-2023:7639
  • https://access.redhat.com/errata/RHSA-2023:7641
View more
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…