5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.6 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
13.2%
github.com/nghttp2/nghttp2/ is vulnerable to Denial of Service (DoS). The vulnerability is due a lack of frame count restrictions, which can result in nghttp2 reading an unbounded number of HTTP/2 CONTINUATION frames even after the stream is reset to keep HPACK context in sync. An attacker can exploit this vulnerability to cause Denial of Service by flooding the webserver with CONTINUATION frames.
www.openwall.com/lists/oss-security/2024/04/03/16
github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0
github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9
github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q
lists.debian.org/debian-lts-announce/2024/04/msg00026.html
lists.fedoraproject.org/archives/list/[email protected]/message/AGOME6ZXJG7664IPQNVE3DL67E3YP3HY/
lists.fedoraproject.org/archives/list/[email protected]/message/J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA/
lists.fedoraproject.org/archives/list/[email protected]/message/PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK/
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.6 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
13.2%