mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
68 lines
2.8 KiB
JSON
68 lines
2.8 KiB
JSON
{
|
|
"id": "CVE-2024-1765",
|
|
"sourceIdentifier": "cna@cloudflare.com",
|
|
"published": "2024-03-12T18:15:07.700",
|
|
"lastModified": "2024-11-21T08:51:15.800",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cloudflare Quiche (through version 0.19.1/0.20.0) was affected by an unlimited resource allocation vulnerability causing rapid increase of memory usage of the system running quiche server or client.\nA remote attacker could take advantage of this vulnerability by repeatedly sending an unlimited number of 1-RTT CRYPTO frames after previously completing the QUIC handshake.\nExploitation was possible for the duration of the connection which could be extended by the attacker.\u00a0\nquiche 0.19.2 and 0.20.1 are the earliest versions containing the fix for this issue.\n\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Cloudflare Quiche (hasta la versi\u00f3n 0.19.1/0.20.0) se vio afectado por una vulnerabilidad de asignaci\u00f3n de recursos ilimitada que provoc\u00f3 un r\u00e1pido aumento del uso de memoria del sistema que ejecuta el servidor o cliente quiche. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad enviando repetidamente un n\u00famero ilimitado de fotogramas 1-RTT CRYPTO despu\u00e9s de completar previamente el protocolo de enlace QUIC. La explotaci\u00f3n era posible mientras durara la conexi\u00f3n, que el atacante pod\u00eda ampliar. quiche 0.19.2 y 0.20.1 son las primeras versiones que contienen la soluci\u00f3n para este problema."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "cna@cloudflare.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"baseScore": 5.9,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.2,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cna@cloudflare.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-400"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-770"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/cloudflare/quiche/security/advisories/GHSA-78wx-jg4j-5j6g",
|
|
"source": "cna@cloudflare.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/cloudflare/quiche/security/advisories/GHSA-78wx-jg4j-5j6g",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |