Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-34362
HistoryJun 04, 2024 - 8:59 p.m.

CVE-2024-34362 Envoy affected by a crash (use-after-free) in EnvoyQuicServerStream

2024-06-0420:59:56
CWE-416
GitHub_M
github.com
3
cve-2024-34362
exploit
httpconnectionmanager
envoyquicserverstream
cloud-native
open source
edge
service proxy
vulnerability

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

5.7

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Envoy is a cloud-native, open source edge and service proxy. There is a use-after-free in HttpConnectionManager (HCM) with EnvoyQuicServerStream that can crash Envoy. An attacker can exploit this vulnerability by sending a request without FIN, then a RESET_STREAM frame, and then after receiving the response, closing the connection.

CNA Affected

[
  {
    "vendor": "envoyproxy",
    "product": "envoy",
    "versions": [
      {
        "status": "affected",
        "version": ">= 1.30.0, <= 11.30.1"
      },
      {
        "status": "affected",
        "version": ">= 1.29.0, <= 1.29.4"
      },
      {
        "status": "affected",
        "version": ">= 1.28.0, <= 1.28.3"
      },
      {
        "status": "affected",
        "version": "<= 1.27.5"
      }
    ]
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*"
    ],
    "vendor": "envoyproxy",
    "product": "envoy",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "1.27.6",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "1.28.0",
        "lessThan": "1.28.4",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "1.29.0",
        "lessThan": "1.29.5",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "1.30.0",
        "lessThan": "1.30.2",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

5.7

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-34362