CVE-2023-39325Allocation of Resources Without Limits or Throttling in Standard Library NET Http

Severity
7.5HIGHNVD
EPSS
0.1%
top 64.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 11
Latest updateDec 16

Description

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurren

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages6 packages

NVDgolang/http2< 0.17.0
CVEListV5go_standard_library/net_http1.21.0-01.21.3+1
NVDgolang/go1.20.01.20.10+1
Gogolang.org/x_net< 0.17.0

Also affects: Fedora 37, 38, 39

🔴Vulnerability Details

6
GHSA
Traefik vulnerable to HTTP/2 request causing denial of service2023-10-17
OSV
Traefik vulnerable to HTTP/2 request causing denial of service2023-10-17
CVEList
HTTP/2 rapid reset can cause excessive work in net/http2023-10-11
OSV
HTTP/2 rapid reset can cause excessive work in net/http2023-10-11
GHSA
HTTP/2 rapid reset can cause excessive work in net/http2023-10-11

📋Vendor Advisories

9
Red Hat
ose-olm-catalogd-container: incomplete fix for rapid reset (CVE-2023-39325/CVE-2023-44487)2024-12-16
Ubuntu
Go vulnerabilities2024-11-14
Ubuntu
Go vulnerabilities2024-10-10
Red Hat
etcd: Incomplete fix for CVE-2023-39325/CVE-2023-44487 in OpenStack Platform2024-05-06
Ubuntu
Go vulnerabilities2024-01-11

💬Community

1
Bugzilla
CVE-2023-39325 golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)2023-10-11
CVE-2023-39325 — HIGH severity | cvebase