跳转到帖子

Red Hat: CVE-2023-43622: httpd: mod_http2: DoS in HTTP/2 with initial window size 0 (Multiple Advisories)

recommended_posts

发布于
  • Members

Red Hat: CVE-2023-43622: httpd: mod_http2: DoS in HTTP/2 with initial window size 0 (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
10/23/2023
Created
05/01/2024
Added
05/01/2024
Modified
09/03/2024

Description

An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern. This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout. This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57. Users are recommended to upgrade to version 2.4.58, which fixes the issue.

Solution(s)

  • redhat-upgrade-mod_http2
  • redhat-upgrade-mod_http2-debuginfo
  • redhat-upgrade-mod_http2-debugsource

References

  • CVE-2023-43622
  • RHSA-2024:2368
  • 查看数 706
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…