124 lines
3.9 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-44487",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-10T14:15:10.883",
"lastModified": "2023-10-10T17:15:13.183",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023."
}
],
"metrics": {},
"references": [
{
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/",
"source": "cve@mitre.org"
},
{
"url": "https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/",
"source": "cve@mitre.org"
},
{
"url": "https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/",
"source": "cve@mitre.org"
},
{
"url": "https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/",
"source": "cve@mitre.org"
},
{
"url": "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack",
"source": "cve@mitre.org"
},
{
"url": "https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/alibaba/tengine/issues/1872",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/bcdannyboy/CVE-2023-44487",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/caddyserver/caddy/issues/5877",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/eclipse/jetty.project/issues/10679",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/envoyproxy/envoy/pull/30055",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/grpc/grpc-go/pull/6703",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/haproxy/haproxy/issues/2312",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/hyperium/hyper/issues/3337",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/nghttp2/nghttp2/pull/1961",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0",
"source": "cve@mitre.org"
},
{
"url": "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html",
"source": "cve@mitre.org"
},
{
"url": "https://my.f5.com/manage/s/article/K000137106",
"source": "cve@mitre.org"
},
{
"url": "https://news.ycombinator.com/item?id=37830987",
"source": "cve@mitre.org"
},
{
"url": "https://news.ycombinator.com/item?id=37830998",
"source": "cve@mitre.org"
},
{
"url": "https://news.ycombinator.com/item?id=37831062",
"source": "cve@mitre.org"
},
{
"url": "https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/",
"source": "cve@mitre.org"
},
{
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"source": "cve@mitre.org"
},
{
"url": "https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack",
"source": "cve@mitre.org"
}
]
}