2 results (0.002 seconds)

CVSS: 3.7EPSS: 0%CPEs: 2EXPL: 0

Cloudflare quiche was discovered to be vulnerable to unbounded storage of information related to connection ID retirement, which could lead to excessive resource consumption. Each QUIC connection possesses a set of connection Identifiers (IDs); see RFC 9000 Section 5.1 https://datatracker.ietf.org/doc/html/rfc9000#section-5.1 . Endpoints declare the number of active connection IDs they are willing to support using the active_connection_id_limit transport parameter. The peer can create new IDs using a NEW_CONNECTION_ID frame but must stay within the active ID limit. This is done by retirement of old IDs, the endpoint sends NEW_CONNECTION_ID includes a value in the retire_prior_to field, which elicits a RETIRE_CONNECTION_ID frame as confirmation. • https://github.com/cloudflare/quiche/security/advisories/GHSA-xhg9-xwch-vr7x • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.9EPSS: 0%CPEs: 2EXPL: 0

Cloudflare Quiche (through version 0.19.1/0.20.0) was affected by an unlimited resource allocation vulnerability causing rapid increase of memory usage of the system running quiche server or client. A remote attacker could take advantage of this vulnerability by repeatedly sending an unlimited number of 1-RTT CRYPTO frames after previously completing the QUIC handshake. Exploitation was possible for the duration of the connection which could be extended by the attacker.  quiche 0.19.2 and 0.20.1 are the earliest versions containing the fix for this issue. Cloudflare Quiche (hasta la versión 0.19.1/0.20.0) se vio afectado por una vulnerabilidad de asignación de recursos ilimitada que provocó un rápido aumento del uso de memoria del sistema que ejecuta el servidor o cliente quiche. Un atacante remoto podría aprovechar esta vulnerabilidad enviando repetidamente un número ilimitado de fotogramas 1-RTT CRYPTO después de completar previamente el protocolo de enlace QUIC. La explotación era posible mientras durara la conexión, que el atacante podía ampliar. quiche 0.19.2 y 0.20.1 son las primeras versiones que contienen la solución para este problema. • https://github.com/cloudflare/quiche/security/advisories/GHSA-78wx-jg4j-5j6g • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •