Lucene search

K
cve[email protected]CVE-2024-32974
HistoryJun 04, 2024 - 9:15 p.m.

CVE-2024-32974

2024-06-0421:15:33
CWE-416
web.nvd.nist.gov
cve-2024-32974
nvd
security vulnerability

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.1%

Envoy is a cloud-native, open source edge and service proxy. A crash was observed in EnvoyQuicServerStream::OnInitialHeadersComplete() with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after StopReading() being called on the stream. As after StopReading(), the HCM’s ActiveStream might have already be destroyed and any up calls from QUICHE could potentially cause use after free.

Affected configurations

Vulners
NVD
Node
envoyproxyenvoyRange1.30.011.30.1
OR
envoyproxyenvoyRange1.29.01.29.4
OR
envoyproxyenvoyRange1.28.01.28.3
OR
envoyproxyenvoyRange1.27.5

CNA Affected

[
  {
    "vendor": "envoyproxy",
    "product": "envoy",
    "versions": [
      {
        "version": ">= 1.30.0, <= 11.30.1",
        "status": "affected"
      },
      {
        "version": ">= 1.29.0, <= 1.29.4",
        "status": "affected"
      },
      {
        "version": ">= 1.28.0, <= 1.28.3",
        "status": "affected"
      },
      {
        "version": "<= 1.27.5",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.1%