Lucene search

K
redhatcveRedhat.comRH:CVE-2024-30156
HistoryMar 25, 2024 - 6:23 p.m.

CVE-2024-30156

2024-03-2518:23:44
redhat.com
access.redhat.com
8
varnish cache server
http/2 support
dos attack
mitigation
package update
attack monitoring

6.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

A flaw was found in the Varnish cache server, with HTTP/2 support enabled, that may allow a Denial of Service type of attack. A malicious actor can cause the server to run out of credits during the HTTP/2 connection control flow. As a consequence, the server will stop to properly process the active HTTP streams, retaining the already allocated resources, leading to resource starvation.

Mitigation

A possible mitigation for this issue is to disable http2 support until the package can be updated.
This can be performed by running the following command:

varnishadm param.set feature -http2  

Note: you must remove h2 from the list of protocols if your TLS terminator is advertising it with ALPN.

It's also possible to use the MAIN.sc_bankrupt counter to monitor possible on-going attacks to the varnish server.

6.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%