Lucene search

K
nvd[email protected]NVD:CVE-2024-23327
HistoryFeb 09, 2024 - 11:15 p.m.

CVE-2024-23327

2024-02-0923:15:09
CWE-476
web.nvd.nist.gov
1
envoy
proxy
segfault
vulnerability
upgrade

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

Envoy is a high-performance edge/middle/service proxy. When PPv2 is enabled both on a listener and subsequent cluster, the Envoy instance will segfault when attempting to craft the upstream PPv2 header. This occurs when the downstream request has a command type of LOCAL and does not have the protocol block. This issue has been addressed in releases 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

NVD
Node
envoyproxyenvoyRange1.26.01.26.7
OR
envoyproxyenvoyRange1.27.01.27.3
OR
envoyproxyenvoyRange1.28.01.28.1
OR
envoyproxyenvoyRange1.29.01.29.1

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%