Lucene search

K
redhatcveRedhat.comRH:CVE-2024-27983
HistoryApr 03, 2024 - 7:27 p.m.

CVE-2024-27983

2024-04-0319:27:23
redhat.com
access.redhat.com
10
vulnerability
nodejs
http/2
insufficient limitations
unauthenticated remote attackers
denial of service
red hat
mitigation
update package

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

7.9 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.6%

A vulnerability was found in how Node.js implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated, remote attacker to send packets to vulnerable servers, which could use up compute or memory resources, causing a denial of service.

Mitigation

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

7.9 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.6%