• CVE-2023-45288

发布时间: 2024年4月19日

修改时间: 2025年4月25日

概要

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS v3 指标

NVD openEuler
Confidentiality None
Attack Vector Network
CVSS评分 N/A 7.5
Attack Complexity Low
Privileges Required None
Scope Unchanged
Integrity None
User Interaction None
Availability High

安全公告

公告名 概要 发布时间
KylinSec-SA-2025-1601 etcd security update 2025年3月13日
KylinSec-SA-2025-2522 etcd security update 2025年6月23日

影响产品

产品 状态
KY3.4-4A golang Fixed
KY3.5.2 golang Fixed
KY3.4-5 golang Fixed
V6 golang Fixed
KY3.5.1 golang Fixed