中危 Apache HTTP 服务器:在 RST 上未立即回收 HTTP/2 流内存 (CVE-2023-45802)
CVE编号
CVE-2023-45802利用情况
暂无补丁情况
官方补丁披露时间
2023-10-13漏洞描述
When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the requests memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out. Users are recommended to upgrade to version 2.4.58, which fixes the issue.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | apache | http_server | * | Up to (excluding) 2.4.58 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.15 | apache2 | * | Up to (excluding) 2.4.58-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.16 | apache2 | * | Up to (excluding) 2.4.58-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.17 | apache2 | * | Up to (excluding) 2.4.58-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.18 | apache2 | * | Up to (excluding) 2.4.58-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_edge | apache2 | * | Up to (excluding) 2.4.58-r0 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2 | httpd | * | Up to (excluding) 2.4.58-1.amzn2 | |||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | httpd24 | * | Up to (excluding) 2.4.58-1.101.amzn1 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | apache2 | * | Up to (including) 2.4.38-3+deb10u8 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | apache2 | * | Up to (including) 2.4.56-1~deb11u2 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | apache2 | * | Up to (including) 2.4.57-2 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | apache2 | * | Up to (excluding) 2.4.58-1 | |||||
运行在以下环境 | |||||||||
系统 | fedoraproject | fedora | 38 | - | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | mod_http2 | * | Up to (excluding) 2.0.25-1.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_38 | mod_http2 | * | Up to (excluding) 2.0.25-1.fc38 | |||||
运行在以下环境 | |||||||||
系统 | fedora_39 | mod_http2 | * | Up to (excluding) 2.0.25-1.fc39 | |||||
- 攻击路径 本地
- 攻击复杂度 困难
- 权限要求 管控权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-400 | 未加控制的资源消耗(资源穷尽) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论