Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-22189
HistoryApr 04, 2024 - 12:00 a.m.

CVE-2024-22189

2024-04-0400:00:00
ubuntu.com
ubuntu.com
4
quic-go
protocol vulnerability
version 0.42.0
memory exhaustion
new_connection_id
retire_connection_id
congestion window
rtt estimate

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

quic-go is an implementation of the QUIC protocol in Go. Prior to version
0.42.0, an attacker can cause its peer to run out of memory sending a large
number of NEW_CONNECTION_ID frames that retire old connection IDs. The
receiver is supposed to respond to each retirement frame with a
RETIRE_CONNECTION_ID frame. The attacker can prevent the receiver from
sending out (the vast majority of) these RETIRE_CONNECTION_ID frames by
collapsing the peers congestion window (by selectively acknowledging
received packets) and by manipulating the peer’s RTT estimate. Version
0.42.0 contains a patch for the issue. No known workarounds are available.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%