CVE-2024-47609

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-47609
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47609.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47609
Aliases
Downstream
Related
Published
2024-10-01T20:13:55.017Z
Modified
2025-12-01T12:37:00.006871Z
Severity
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/U:Green CVSS Calculator
Summary
Remotely exploitable DoS in Tonic `<=v0.12.2`
Details

Tonic is a native gRPC client & server implementation with async/await support. When using tonic::transport::Server there is a remote DoS attack that can cause the server to exit cleanly on accepting a TCP/TLS stream. This can be triggered by causing the accept call to error out with errors that were not covered correctly causing the accept loop to exit. Upgrading to tonic 0.12.3 and above contains the fix.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-755"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47609.json"
}
References

Affected packages

Git / github.com/hyperium/tonic

Affected ranges

Type
GIT
Repo
https://github.com/hyperium/tonic
Events

Affected versions

v0.*

v0.12.2