Lucene search

K
githubGitHub Advisory DatabaseGHSA-78WX-JG4J-5J6G
HistoryMar 13, 2024 - 3:39 p.m.

quiche vulnerable to unlimited resource allocation by QUIC CRYPTO frames flooding

2024-03-1315:39:40
CWE-400
GitHub Advisory Database
github.com
4
cloudflare
quiche
vulnerability
resource allocation
quic
crypto frames
flooding
remote attacker
memory usage
system
exploitation
connection
patch
1-rtt
quic handshake

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Impact

Cloudflare Quiche (through version 0.19.1/0.20.0) was affected by an unlimited resource allocation vulnerability causing rapid increase of memory usage of the system running quiche server or client.

A remote attacker could take advantage of this vulnerability by repeatedly sending an unlimited number of 1-RTT CRYPTO frames after previously completing the QUIC handshake.
Exploitation was possible for the duration of the connection which could be extended by the attacker.

Patches

Quiche 0.19.2 and 0.20.1 are the earliest versions containing the fix for this issue.

Affected configurations

Vulners
Node
cloudflarequicheRange<0.20.1
OR
cloudflarequicheRange<0.19.2
CPENameOperatorVersion
quichelt0.20.1
quichelt0.19.2

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for GHSA-78WX-JG4J-5J6G