GHSA-78WX-JG4J-5J6G
Vulnerability from github – Published: 2024-03-13 15:39 – Updated: 2024-03-13 15:39
VLAI?
Summary
quiche vulnerable to unlimited resource allocation by QUIC CRYPTO frames flooding
Details
Impact
Cloudflare Quiche (through version 0.19.1/0.20.0) was affected by an unlimited resource allocation vulnerability causing rapid increase of memory usage of the system running quiche server or client.
A remote attacker could take advantage of this vulnerability by repeatedly sending an unlimited number of 1-RTT CRYPTO frames after previously completing the QUIC handshake. Exploitation was possible for the duration of the connection which could be extended by the attacker.
Patches
Quiche 0.19.2 and 0.20.1 are the earliest versions containing the fix for this issue.
Severity ?
5.9 (Medium)
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "quiche"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.19.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "crates.io",
"name": "quiche"
},
"ranges": [
{
"events": [
{
"introduced": "0.20.0"
},
{
"fixed": "0.20.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-1765"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": true,
"github_reviewed_at": "2024-03-13T15:39:40Z",
"nvd_published_at": "2024-03-12T18:15:07Z",
"severity": "MODERATE"
},
"details": "### Impact\n\nCloudflare Quiche (through version 0.19.1/0.20.0) was affected by an unlimited resource allocation vulnerability causing rapid increase of memory usage of the system running quiche server or client.\n\nA remote attacker could take advantage of this vulnerability by repeatedly sending an unlimited number of 1-RTT CRYPTO frames after previously completing the QUIC handshake.\nExploitation was possible for the duration of the connection which could be extended by the attacker.\n\n### Patches\n\nQuiche 0.19.2 and 0.20.1 are the earliest versions containing the fix for this issue.",
"id": "GHSA-78wx-jg4j-5j6g",
"modified": "2024-03-13T15:39:41Z",
"published": "2024-03-13T15:39:40Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/cloudflare/quiche/security/advisories/GHSA-78wx-jg4j-5j6g"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1765"
},
{
"type": "WEB",
"url": "https://github.com/cloudflare/quiche/commit/1017466c143fc93a82b286a1ba35e53334cdf8e2"
},
{
"type": "WEB",
"url": "https://github.com/cloudflare/quiche/commit/11dbf5461ab657bbc02e466d719070124b27ef3c"
},
{
"type": "PACKAGE",
"url": "https://github.com/cloudflare/quiche"
},
{
"type": "WEB",
"url": "https://github.com/cloudflare/quiche/releases/tag/0.19.2"
},
{
"type": "WEB",
"url": "https://github.com/cloudflare/quiche/releases/tag/0.20.1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "quiche vulnerable to unlimited resource allocation by QUIC CRYPTO frames flooding"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…