CVE-2023-44487 - Uncontrolled Resource Consumption

Severity

75%

Complexity

39%

Confidentiality

60%

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

CVSS 3.1 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

Demo Examples

Uncontrolled Resource Consumption

CWE-400

The following example demonstrates the weakness.


               
}
}
}
...
Thread.currentThread().interrupt();// postpone response
...
new Thread(loop).start();
}
}
}
r.run();
...

There are no limits to runnables. Potentially an attacker could cause resource problems very quickly.

Uncontrolled Resource Consumption

CWE-400

This code allocates a socket and forks each time it receives a new connection.


               
}
pid = fork();

The program does not track how many connections have been made, and it does not limit the number of connections. Because forking is a relatively expensive operation, an attacker would be able to cause the system to run out of CPU, processes, or memory by making a large number of connections. Alternatively, an attacker could consume all available connections, preventing others from accessing the system remotely.

Uncontrolled Resource Consumption

CWE-400

In the following example a server socket connection is used to accept a request to store data on the local file system using a specified filename. The method openSocketConnection establishes a server socket to accept requests from a client. When a client establishes a connection to this service the getNextMessage method is first used to retrieve from the socket the name of the file to store the data, the openFileToWrite method will validate the filename and open a file to write to on the local file system. The getNextMessage is then used within a while loop to continuously read data from the socket and output the data to the file until there is no longer any data from the socket.


               
}
closeSocket(socket);
return(FAIL);
closeFile();
}
break;

This example creates a situation where data can be dumped to a file on the local file system without any limits on the size of the file. This could potentially exhaust file or disk resources and/or limit other clients' ability to access the service.

Uncontrolled Resource Consumption

CWE-400

In the following example, the processMessage method receives a two dimensional character array containing the message to be processed. The two-dimensional character array contains the length of the message in the first character array and the message body in the second character array. The getMessageLength method retrieves the integer value of the length from the first character array. After validating that the message length is greater than zero, the body character array pointer points to the start of the second character array of the two-dimensional character array and memory is allocated for the new body character array.


               
}/* process message accepts a two-dimensional character array of the form [length][body] containing the message to be processed */
}
return(SUCCESS);
return(FAIL);

This example creates a situation where the length of the body character array can be very large and will consume excessive memory, exhausting system resources. This can be avoided by restricting the length of the second character array with a maximum length check

Also, consider changing the type from 'int' to 'unsigned int', so that you are always guaranteed that the number is positive. This might not be possible if the protocol specifically requires allowing negative values, or if you cannot control the return value from getMessageLength(), but it could simplify the check to ensure the input is positive, and eliminate other errors such as signed-to-unsigned conversion errors (CWE-195) that may occur elsewhere in the code.


               
if ((length > 0) && (length < MAX_LENGTH)) {...}

Uncontrolled Resource Consumption

CWE-400

In the following example, a server object creates a server socket and accepts client connections to the socket. For every client connection to the socket a separate thread object is generated using the ClientSocketThread class that handles request made by the client through the socket.


               
}
} catch (IOException ex) {...}
serverSocket.close();
t.start();

In this example there is no limit to the number of client connections and client threads that are created. Allowing an unlimited number of client connections and threads could potentially overwhelm the system and system resources.

The server should limit the number of client connections and the client threads that are created. This can be easily done by creating a thread pool object that limits the number of threads that are generated.


               
}
} catch (IOException ex) {...}
serverSocket.close();
pool.execute(t);

Overview

First reported 1 year ago

2023-10-10 14:15:00

Last updated 1 year ago

2023-12-20 17:55:00

Affected Software

F5 Big-IP Analytics

F5 Big-IP Policy Enforcement Manager (PEM)

F5 Networks Big-IP Local Traffic Manager (LTM)

F5 Big-IP Link Controller

F5 Big-IP Global Traffic Manager (GTM)

F5 Big-IP Fraud Protection Service (FPS)

F5 Big-IP Domain Name System (DNS)

F5 Big-IP Application Security Manager (ASM)

F5 Big-IP Application Acceleration Manager (AAM)

F5 Big-IP Advanced Firewall Manager (AFM)

F5 Big-IP Access Policy Manager (APM)

F5 Big-IP WebAccelerator

Apache Software Foundation Tomcat

Microsoft Windows Server 2016

Microsoft Windows Server 2019

Facebook Proxygen -

Red Hat Enterprise Linux 6.0

6.0

Red Hat JBoss Enterprise Application Platform (EAP) 6.0.0

6.0.0

Red Hat JBoss Fuse 6.0.0

6.0.0

Red Hat Satellite 6.0

6.0

Red Hat JBoss Enterprise Application Platform (EAP) 7.0.0

7.0.0

Red Hat Decision Manager 7.0

7.0

Red Hat JBoss Core Services

Red Hat Enterprise Linux 8.0

8.0

Red Hat JBoss Fuse 7.0.0

7.0.0

Red Hat Process Automation 7.0

7.0

Red Hat JBoss Data Grid 7.0.0

7.0.0

Red Hat Quay 3.0.0

3.0.0

Red Hat Openshift Container Platform 4.0

4.0

References

https://aws.amazon.com/security/security-bulletins/AWS-2023-011/

https://news.ycombinator.com/item?id=37831062

https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack

https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/

https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack

https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/

https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/

https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/

https://github.com/bcdannyboy/CVE-2023-44487

https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/

https://github.com/eclipse/jetty.project/issues/10679

https://github.com/alibaba/tengine/issues/1872

https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764

https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61

https://github.com/nghttp2/nghttp2/pull/1961

https://news.ycombinator.com/item?id=37830987

https://news.ycombinator.com/item?id=37830998

https://github.com/envoyproxy/envoy/pull/30055

https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2

https://github.com/caddyserver/caddy/issues/5877

https://github.com/haproxy/haproxy/issues/2312

https://github.com/grpc/grpc-go/pull/6703

https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244

https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0

https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html

https://my.f5.com/manage/s/article/K000137106

https://bugzilla.proxmox.com/show_bug.cgi?id=4988

https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/

https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9

https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088

https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve

https://github.com/micrictor/http2-rst-stream

https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf

https://github.com/dotnet/announcements/issues/277

https://github.com/apache/trafficserver/pull/10564

https://github.com/facebook/proxygen/pull/466

https://github.com/microsoft/CBL-Mariner/pull/6381

https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo

https://github.com/nodejs/node/pull/50121

https://github.com/h2o/h2o/pull/3291

https://github.com/advisories/GHSA-vx74-f528-fxqg

https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/

https://github.com/golang/go/issues/63417

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487

https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q

https://www.openwall.com/lists/oss-security/2023/10/10/6

https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14

https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected

https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73

https://github.com/kubernetes/kubernetes/pull/121120

https://github.com/oqtane/oqtane.framework/discussions/3367

https://github.com/opensearch-project/data-prepper/issues/3474

https://github.com/advisories/GHSA-xpw8-rcwv-8f8p

https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487

https://netty.io/news/2023/10/10/4-1-100-Final.html

https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack

https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/

https://news.ycombinator.com/item?id=37837043

https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487

https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113

https://github.com/kazu-yamamoto/http2/issues/93

https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html

https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1

DSA-5522

DSA-5521

https://blog.vespa.ai/cve-2023-44487/

https://github.com/tempesta-tech/tempesta/issues/1986

https://ubuntu.com/security/CVE-2023-44487

https://access.redhat.com/security/cve/cve-2023-44487

https://github.com/junkurihara/rust-rpxy/issues/97

https://istio.io/latest/news/security/istio-security-2023-004/

https://bugzilla.redhat.com/show_bug.cgi?id=2242803

https://github.com/etcd-io/etcd/issues/16740

https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125

https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event

https://github.com/advisories/GHSA-qppj-fm5r-hxr3

https://bugzilla.suse.com/show_bug.cgi?id=1216123

https://github.com/ninenines/cowboy/issues/1615

https://github.com/varnishcache/varnish-cache/issues/3996

https://github.com/apache/httpd-site/pull/10

https://github.com/line/armeria/pull/5232

https://github.com/projectcontour/contour/pull/5826

https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632

https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/

https://github.com/akka/akka-http/issues/4323

https://github.com/apache/apisix/issues/10320

https://github.com/openresty/openresty/issues/930

https://github.com/Azure/AKS/issues/3947

https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487

https://security.paloaltonetworks.com/CVE-2023-44487

https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/

https://github.com/Kong/kong/discussions/11741

https://github.com/caddyserver/caddy/releases/tag/v2.7.5

https://aws.amazon.com/security/security-bulletins/AWS-2023-011/

Vendor Advisory

https://news.ycombinator.com/item?id=37831062

Third Party Advisory

https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack

Press/Media Coverage

https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/

Vendor Advisory

https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack

Technical Description, Vendor Advisory

https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/

Technical Description, Vendor Advisory

https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/

Vendor Advisory

https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/

Technical Description, Vendor Advisory

https://github.com/bcdannyboy/CVE-2023-44487

Vendor Advisory

https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/

Third Party Advisory

https://github.com/eclipse/jetty.project/issues/10679

Vendor Advisory

https://github.com/alibaba/tengine/issues/1872

Vendor Advisory

https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764

Vendor Advisory

https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61

Vendor Advisory

https://github.com/nghttp2/nghttp2/pull/1961

Vendor Advisory

https://news.ycombinator.com/item?id=37830987

Third Party Advisory

https://news.ycombinator.com/item?id=37830998

Press/Media Coverage

https://github.com/envoyproxy/envoy/pull/30055

Vendor Advisory

https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2

Vendor Advisory

https://github.com/caddyserver/caddy/issues/5877

Vendor Advisory

https://github.com/haproxy/haproxy/issues/2312

Vendor Advisory

https://github.com/grpc/grpc-go/pull/6703

Vendor Advisory

https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244

Vendor Advisory

https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0

Vendor Advisory

https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html

Mailing List

https://my.f5.com/manage/s/article/K000137106

Vendor Advisory

https://bugzilla.proxmox.com/show_bug.cgi?id=4988

Issue Tracking

https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/

Vendor Advisory

https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9

Patch

https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088

Vendor Advisory

https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve

Technical Description, Vendor Advisory

https://github.com/micrictor/http2-rst-stream

Vendor Advisory

https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf

Vendor Advisory

https://github.com/dotnet/announcements/issues/277

Vendor Advisory

https://github.com/apache/trafficserver/pull/10564

Vendor Advisory

https://github.com/facebook/proxygen/pull/466

Vendor Advisory

https://github.com/microsoft/CBL-Mariner/pull/6381

Vendor Advisory

https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo

Vendor Advisory

https://github.com/nodejs/node/pull/50121

Vendor Advisory

https://github.com/h2o/h2o/pull/3291

Vendor Advisory

https://github.com/advisories/GHSA-vx74-f528-fxqg

Vendor Advisory

https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/

Third Party Advisory

https://github.com/golang/go/issues/63417

Vendor Advisory

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487

Patch, Vendor Advisory

https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q

Vendor Advisory

https://www.openwall.com/lists/oss-security/2023/10/10/6

Mailing List, Third Party Advisory

https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14

Vendor Advisory

https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected

Third Party Advisory

https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73

Vendor Advisory

https://github.com/kubernetes/kubernetes/pull/121120

Vendor Advisory

https://github.com/oqtane/oqtane.framework/discussions/3367

Vendor Advisory

https://github.com/opensearch-project/data-prepper/issues/3474

Vendor Advisory

https://github.com/advisories/GHSA-xpw8-rcwv-8f8p

Vendor Advisory

https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487

Vendor Advisory

https://netty.io/news/2023/10/10/4-1-100-Final.html

Vendor Advisory

https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack

Vendor Advisory

https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/

Press/Media Coverage

https://news.ycombinator.com/item?id=37837043

Third Party Advisory

https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487

Third Party Advisory, US Government Resource

https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113

Vendor Advisory

https://github.com/kazu-yamamoto/http2/issues/93

Vendor Advisory

https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html

Vendor Advisory

https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1

Patch

DSA-5522

Vendor Advisory

DSA-5521

Vendor Advisory

https://blog.vespa.ai/cve-2023-44487/

Vendor Advisory

https://github.com/tempesta-tech/tempesta/issues/1986

Issue Tracking, Vendor Advisory

https://ubuntu.com/security/CVE-2023-44487

Vendor Advisory

https://access.redhat.com/security/cve/cve-2023-44487

Vendor Advisory

https://github.com/junkurihara/rust-rpxy/issues/97

Issue Tracking, Vendor Advisory

https://istio.io/latest/news/security/istio-security-2023-004/

Vendor Advisory

https://bugzilla.redhat.com/show_bug.cgi?id=2242803

Issue Tracking, Vendor Advisory

https://github.com/etcd-io/etcd/issues/16740

Issue Tracking, Vendor Advisory

https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125

Vendor Advisory

https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event

Press/Media Coverage

https://github.com/advisories/GHSA-qppj-fm5r-hxr3

Issue Tracking, Vendor Advisory

https://bugzilla.suse.com/show_bug.cgi?id=1216123

Issue Tracking

https://github.com/ninenines/cowboy/issues/1615

Issue Tracking, Vendor Advisory

https://github.com/varnishcache/varnish-cache/issues/3996

Issue Tracking, Vendor Advisory

https://github.com/apache/httpd-site/pull/10

Issue Tracking, Vendor Advisory

https://github.com/line/armeria/pull/5232

Issue Tracking, Vendor Advisory

https://github.com/projectcontour/contour/pull/5826

Issue Tracking, Vendor Advisory

https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632

Vendor Advisory

https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/

Vendor Advisory

https://github.com/akka/akka-http/issues/4323

Issue Tracking, Vendor Advisory

https://github.com/apache/apisix/issues/10320

Issue Tracking, Vendor Advisory

https://github.com/openresty/openresty/issues/930

Issue Tracking, Vendor Advisory

https://github.com/Azure/AKS/issues/3947

Issue Tracking, Vendor Advisory

https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487

Issue Tracking, Vendor Advisory

https://security.paloaltonetworks.com/CVE-2023-44487

Vendor Advisory

https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/

Vendor Advisory

https://github.com/Kong/kong/discussions/11741

Issue Tracking, Vendor Advisory

https://github.com/caddyserver/caddy/releases/tag/v2.7.5

Issue Tracking, Vendor Advisory

[debian-lts-announce] 20231013 [SECURITY] [DLA 3617-1] tomcat9 security update

Vendor Advisory

[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations

Mailing List, Third Party Advisory

[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations

https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html

https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/

FEDORA-2023-ed2642fd58

https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/

[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update

https://security.netapp.com/advisory/ntap-20231016-0001/

[debian-lts-announce] 20231016 [SECURITY] [DLA 3617-2] tomcat9 regression update

https://news.ycombinator.com/item?id=37831062

Issue Tracking, Third Party Advisory

https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/

Mitigation, Vendor Advisory

https://github.com/bcdannyboy/CVE-2023-44487

Third Party Advisory

https://github.com/eclipse/jetty.project/issues/10679

Issue Tracking, Vendor Advisory

https://github.com/alibaba/tengine/issues/1872

Issue Tracking, Vendor Advisory

https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61

Patch, Vendor Advisory

https://github.com/nghttp2/nghttp2/pull/1961

Patch, Vendor Advisory

https://news.ycombinator.com/item?id=37830987

Issue Tracking, Third Party Advisory

https://news.ycombinator.com/item?id=37830998

Issue Tracking, Press/Media Coverage

https://github.com/envoyproxy/envoy/pull/30055

Patch, Vendor Advisory

https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2

Product

https://github.com/caddyserver/caddy/issues/5877

Issue Tracking, Vendor Advisory

https://github.com/haproxy/haproxy/issues/2312

Issue Tracking, Vendor Advisory

https://github.com/grpc/grpc-go/pull/6703

Patch, Vendor Advisory

https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244

Product, Vendor Advisory

https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0

Release Notes

https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html

Mailing List, Patch

https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/

Patch, Vendor Advisory

https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9

Mailing List, Patch

https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088

Third Party Advisory

https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve

Technical Description, Third Party Advisory

https://github.com/micrictor/http2-rst-stream

Exploit, Third Party Advisory

https://github.com/dotnet/announcements/issues/277

Mitigation, Vendor Advisory

https://github.com/apache/trafficserver/pull/10564

Patch, Vendor Advisory

https://github.com/facebook/proxygen/pull/466

Patch, Vendor Advisory

https://github.com/microsoft/CBL-Mariner/pull/6381

Patch, Vendor Advisory

https://github.com/h2o/h2o/pull/3291

Patch

https://github.com/advisories/GHSA-vx74-f528-fxqg

Mitigation, Patch, Vendor Advisory

https://github.com/golang/go/issues/63417

Issue Tracking, Vendor Advisory

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487

Mitigation, Patch, Vendor Advisory

https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q

Mailing List, Vendor Advisory

https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14

Release Notes, Vendor Advisory

https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73

Product, Release Notes, Vendor Advisory

https://github.com/kubernetes/kubernetes/pull/121120

Patch, Vendor Advisory

https://github.com/oqtane/oqtane.framework/discussions/3367

Issue Tracking, Vendor Advisory

https://github.com/opensearch-project/data-prepper/issues/3474

Issue Tracking, Patch, Vendor Advisory

https://github.com/advisories/GHSA-xpw8-rcwv-8f8p

Patch, Vendor Advisory

https://netty.io/news/2023/10/10/4-1-100-Final.html

Release Notes, Vendor Advisory

https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack

Press/Media Coverage

https://news.ycombinator.com/item?id=37837043

Issue Tracking

https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113

Product

https://github.com/kazu-yamamoto/http2/issues/93

Issue Tracking

https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html

Third Party Advisory

https://github.com/etcd-io/etcd/issues/16740

Issue Tracking, Patch, Vendor Advisory

https://github.com/advisories/GHSA-qppj-fm5r-hxr3

Vendor Advisory

https://bugzilla.suse.com/show_bug.cgi?id=1216123

Issue Tracking, Vendor Advisory

https://github.com/line/armeria/pull/5232

Issue Tracking, Patch, Vendor Advisory

https://github.com/projectcontour/contour/pull/5826

Issue Tracking, Patch, Vendor Advisory

https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487

Vendor Advisory

https://github.com/caddyserver/caddy/releases/tag/v2.7.5

Release Notes

[debian-lts-announce] 20231013 [SECURITY] [DLA 3617-1] tomcat9 security update

Mailing List

[oss-security] 20231013 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations

Mailing List, Third Party Advisory

https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html

Mailing List

https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/

Press/Media Coverage, Third Party Advisory

FEDORA-2023-ed2642fd58

Mailing List, Third Party Advisory

https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/

Vendor Advisory

[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update

Mailing List, Third Party Advisory

https://security.netapp.com/advisory/ntap-20231016-0001/

Third Party Advisory

[debian-lts-announce] 20231016 [SECURITY] [DLA 3617-2] tomcat9 regression update

Mailing List, Third Party Advisory

[oss-security] 20231018 Vulnerability in Jenkins

[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations

[oss-security] 20231019 CVE-2023-45802: Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST

FEDORA-2023-5ff7bf1dd8

FEDORA-2023-54fadada12

[oss-security] 20231020 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations

[oss-security] 20231018 Vulnerability in Jenkins

Mailing List, Third Party Advisory

[oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations

Mailing List, Third Party Advisory

[oss-security] 20231019 CVE-2023-45802: Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST

Mailing List, Third Party Advisory

FEDORA-2023-5ff7bf1dd8

Mailing List

FEDORA-2023-54fadada12

Mailing List

[oss-security] 20231020 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations

Mailing List

FEDORA-2023-2a9214af5f

FEDORA-2023-0259c3f26f

FEDORA-2023-17efd3f2cd

FEDORA-2023-d5030c983c

FEDORA-2023-f66fc0f62a

FEDORA-2023-e9c04d81c1

FEDORA-2023-4d2fd884ea

FEDORA-2023-b2c50535cb

FEDORA-2023-fe53e13b5b

FEDORA-2023-4bf641255e

[debian-lts-announce] 20231030 [SECURITY] [DLA 3641-1] jetty9 security update

DSA-5540

[debian-lts-announce] 20231031 [SECURITY] [DLA 3638-1] h2o security update

https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715

FEDORA-2023-1caffb88af

FEDORA-2023-7934802344

FEDORA-2023-7b52921cae

FEDORA-2023-3f70b8d406

FEDORA-2023-dbe64661af

FEDORA-2023-822aab0a5a

[debian-lts-announce] 20231105 [SECURITY] [DLA 3645-1] trafficserver security update

DSA-5549

FEDORA-2023-ed2642fd58

FEDORA-2023-54fadada12

FEDORA-2023-5ff7bf1dd8

FEDORA-2023-17efd3f2cd

FEDORA-2023-d5030c983c

FEDORA-2023-0259c3f26f

FEDORA-2023-2a9214af5f

FEDORA-2023-e9c04d81c1

FEDORA-2023-f66fc0f62a

FEDORA-2023-4d2fd884ea

FEDORA-2023-b2c50535cb

FEDORA-2023-fe53e13b5b

FEDORA-2023-4bf641255e

FEDORA-2023-1caffb88af

FEDORA-2023-3f70b8d406

FEDORA-2023-7b52921cae

FEDORA-2023-7934802344

FEDORA-2023-dbe64661af

FEDORA-2023-822aab0a5a

FEDORA-2023-c0c6a91330

FEDORA-2023-492b7be466

DSA-5558

[debian-lts-announce] 20231119 [SECURITY] [DLA 3656-1] netty security update

GLSA-202311-09

https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2

Product, Third Party Advisory

https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0

Release Notes, Third Party Advisory

https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html

Mailing List, Patch, Third Party Advisory

https://bugzilla.proxmox.com/show_bug.cgi?id=4988

Issue Tracking, Third Party Advisory

https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9

Mailing List, Patch, Vendor Advisory

https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo

Mailing List, Vendor Advisory

https://github.com/h2o/h2o/pull/3291

Patch, Third Party Advisory

https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack

Press/Media Coverage, Third Party Advisory

https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/

Press/Media Coverage, Third Party Advisory

https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113

Product, Third Party Advisory

https://github.com/kazu-yamamoto/http2/issues/93

Issue Tracking, Third Party Advisory

https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1

Patch, Third Party Advisory

https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event

Press/Media Coverage, Third Party Advisory

https://github.com/caddyserver/caddy/releases/tag/v2.7.5

Release Notes, Third Party Advisory

[debian-lts-announce] 20231013 [SECURITY] [DLA 3617-1] tomcat9 security update

Mailing List, Third Party Advisory

https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html

Mailing List, Third Party Advisory

[debian-lts-announce] 20231030 [SECURITY] [DLA 3641-1] jetty9 security update

Third Party Advisory

DSA-5540

Third Party Advisory

[debian-lts-announce] 20231031 [SECURITY] [DLA 3638-1] h2o security update

Third Party Advisory

https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715

Third Party Advisory

[debian-lts-announce] 20231105 [SECURITY] [DLA 3645-1] trafficserver security update

Mailing List, Third Party Advisory

DSA-5549

Third Party Advisory

FEDORA-2023-ed2642fd58

Mailing List, Third Party Advisory

FEDORA-2023-54fadada12

Mailing List, Third Party Advisory

FEDORA-2023-5ff7bf1dd8

Mailing List, Third Party Advisory

FEDORA-2023-17efd3f2cd

Mailing List, Third Party Advisory

FEDORA-2023-d5030c983c

Mailing List, Third Party Advisory

FEDORA-2023-0259c3f26f

Mailing List, Third Party Advisory

FEDORA-2023-2a9214af5f

Mailing List, Third Party Advisory

FEDORA-2023-e9c04d81c1

Mailing List, Third Party Advisory

FEDORA-2023-f66fc0f62a

Mailing List, Third Party Advisory

FEDORA-2023-4d2fd884ea

Mailing List, Third Party Advisory

FEDORA-2023-b2c50535cb

Mailing List, Third Party Advisory

FEDORA-2023-fe53e13b5b

Mailing List, Third Party Advisory

FEDORA-2023-4bf641255e

Mailing List, Third Party Advisory

FEDORA-2023-1caffb88af

Mailing List, Third Party Advisory

FEDORA-2023-3f70b8d406

Mailing List, Third Party Advisory

FEDORA-2023-7b52921cae

Mailing List, Third Party Advisory

FEDORA-2023-7934802344

Mailing List, Third Party Advisory

FEDORA-2023-dbe64661af

Mailing List, Third Party Advisory

FEDORA-2023-822aab0a5a

Mailing List, Third Party Advisory

FEDORA-2023-c0c6a91330

Mailing List, Third Party Advisory

FEDORA-2023-492b7be466

Mailing List, Third Party Advisory

DSA-5558

Third Party Advisory

[debian-lts-announce] 20231119 [SECURITY] [DLA 3656-1] netty security update

Mailing List, Third Party Advisory

GLSA-202311-09

Third Party Advisory

DSA-5570

DSA-5570

Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.