GHSA-vx74-f528-fxqg

Suggest an improvement
Source
https://github.com/advisories/GHSA-vx74-f528-fxqg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-vx74-f528-fxqg/GHSA-vx74-f528-fxqg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vx74-f528-fxqg
Aliases
Published
2023-10-10T18:23:21Z
Modified
2024-10-15T05:57:15.899582Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
github.com/nghttp2/nghttp2 has HTTP/2 Rapid Reset
Details

Impact

Rapidly creating and cancelling streams (HEADERS frame immediately followed by RST_STREAM) without bound cause denial of service.

See https://www.cve.org/CVERecord?id=CVE-2023-44487 for details.

Patches

nghttp2 v1.57.0 mitigates this vulnerability by default.

Workarounds

If upgrading to nghttp2 v1.57.0 is not possible, implement nghttp2_on_frame_recv_callback, and check and count RSTSTREAM frames. If excessive number of RSTSTREAM are received, then take action, such as dropping connection silently, or call nghttp2_submit_goaway and gracefully terminate the connection.

References

The following commit mitigates this vulnerability:

  • https://github.com/nghttp2/nghttp2/commit/72b4af6143681f528f1d237b21a9a7aee1738832
References

Affected packages

Go / github.com/nghttp2/nghttp2

Package

Name
github.com/nghttp2/nghttp2
View open source insights on deps.dev
Purl
pkg:golang/github.com/nghttp2/nghttp2

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.57.0