Apache HTTP 服务器:在 RST 上未立即回收 HTTP/2 流内存 (CVE-2023-45802)

admin 2023-11-29 20:47:04 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 Apache HTTP 服务器:在 RST 上未立即回收 HTTP/2 流内存 (CVE-2023-45802)

CVE编号

CVE-2023-45802

利用情况

暂无

补丁情况

官方补丁

披露时间

2023-10-13
漏洞描述
When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the requests memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out. Users are recommended to upgrade to version 2.4.58, which fixes the issue.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://httpd.apache.org/security/vulnerabilities_24.html
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://security.netapp.com/advisory/ntap-20231027-0011/
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 apache http_server * Up to (excluding) 2.4.58
运行在以下环境
系统 alpine_3.15 apache2 * Up to (excluding) 2.4.58-r0
运行在以下环境
系统 alpine_3.16 apache2 * Up to (excluding) 2.4.58-r0
运行在以下环境
系统 alpine_3.17 apache2 * Up to (excluding) 2.4.58-r0
运行在以下环境
系统 alpine_3.18 apache2 * Up to (excluding) 2.4.58-r0
运行在以下环境
系统 alpine_edge apache2 * Up to (excluding) 2.4.58-r0
运行在以下环境
系统 amazon_2 httpd * Up to (excluding) 2.4.58-1.amzn2
运行在以下环境
系统 amazon_AMI httpd24 * Up to (excluding) 2.4.58-1.101.amzn1
运行在以下环境
系统 debian_10 apache2 * Up to (including) 2.4.38-3+deb10u8
运行在以下环境
系统 debian_11 apache2 * Up to (including) 2.4.56-1~deb11u2
运行在以下环境
系统 debian_12 apache2 * Up to (including) 2.4.57-2
运行在以下环境
系统 debian_sid apache2 * Up to (excluding) 2.4.58-1
运行在以下环境
系统 fedoraproject fedora 38 -
运行在以下环境
系统 fedora_37 mod_http2 * Up to (excluding) 2.0.25-1.fc37
运行在以下环境
系统 fedora_38 mod_http2 * Up to (excluding) 2.0.25-1.fc38
运行在以下环境
系统 fedora_39 mod_http2 * Up to (excluding) 2.0.25-1.fc39
阿里云评分 5.4
  • 攻击路径 本地
  • 攻击复杂度 困难
  • 权限要求 管控权限
  • 影响范围 有限影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-400 未加控制的资源消耗(资源穷尽)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0