Lucene search

K
cve[email protected]CVE-2022-41717
HistoryDec 08, 2022 - 8:15 p.m.

CVE-2022-41717

2022-12-0820:15:10
CWE-770
web.nvd.nist.gov
327
cve-2022-41717
go server
http/2
memory growth
security vulnerability
nvd

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

6.6 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.9%

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

Affected configurations

NVD
Node
golanggoRange<1.18.9
OR
golanggoRange1.19.01.19.4
OR
golanghttp2Range<0.4.0go
Node
fedoraprojectfedoraMatch37
OR
fedoraprojectfedoraMatch38

CNA Affected

[
  {
    "vendor": "Go standard library",
    "product": "net/http",
    "collectionURL": "https://pkg.go.dev",
    "packageName": "net/http",
    "versions": [
      {
        "version": "0",
        "lessThan": "1.18.9",
        "status": "affected",
        "versionType": "semver"
      },
      {
        "version": "1.19.0-0",
        "lessThan": "1.19.4",
        "status": "affected",
        "versionType": "semver"
      }
    ],
    "programRoutines": [
      {
        "name": "http2serverConn.canonicalHeader"
      },
      {
        "name": "ListenAndServe"
      },
      {
        "name": "ListenAndServeTLS"
      },
      {
        "name": "Serve"
      },
      {
        "name": "ServeTLS"
      },
      {
        "name": "Server.ListenAndServe"
      },
      {
        "name": "Server.ListenAndServeTLS"
      },
      {
        "name": "Server.Serve"
      },
      {
        "name": "Server.ServeTLS"
      },
      {
        "name": "http2Server.ServeConn"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "golang.org/x/net",
    "product": "golang.org/x/net/http2",
    "collectionURL": "https://pkg.go.dev",
    "packageName": "golang.org/x/net/http2",
    "versions": [
      {
        "version": "0",
        "lessThan": "0.4.0",
        "status": "affected",
        "versionType": "semver"
      }
    ],
    "programRoutines": [
      {
        "name": "serverConn.canonicalHeader"
      },
      {
        "name": "Server.ServeConn"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

References

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

6.6 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.9%