跳转到帖子

VMware Photon OS: CVE-2024-7246

recommended_posts

发布于
  • Members

VMware Photon OS: CVE-2024-7246

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
08/06/2024
Created
01/21/2025
Added
01/20/2025
Modified
01/20/2025

Description

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

Solution(s)

  • vmware-photon_os_update_tdnf

References

  • https://attackerkb.com/topics/cve-2024-7246
  • CVE - 2024-7246
  • 查看数 695
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…