中危 Apache HTTP 服务器:在 RST 上未立即回收 HTTP/2 流内存 (CVE-2023-45802)

CVE编号

CVE-2023-45802

利用情况

暂无

补丁情况

官方补丁

披露时间

2023-10-13
漏洞描述
When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the requests memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out. Users are recommended to upgrade to version 2.4.58, which fixes the issue.


解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 apache http_server * Up to
(excluding)
2.4.58
运行在以下环境
系统 alpine_3.15 apache2 * Up to
(excluding)
2.4.58-r0
运行在以下环境
系统 alpine_3.16 apache2 * Up to
(excluding)
2.4.58-r0
运行在以下环境
系统 alpine_3.17 apache2 * Up to
(excluding)
2.4.58-r0
运行在以下环境
系统 alpine_3.18 apache2 * Up to
(excluding)
2.4.58-r0
运行在以下环境
系统 alpine_3.19 apache2 * Up to
(excluding)
2.4.58-r0
运行在以下环境
系统 amazon_2 httpd * Up to
(excluding)
2.4.58-1.amzn2
运行在以下环境
系统 amazon_2023 httpd * Up to
(excluding)
2.4.58-1.amzn2023
运行在以下环境
系统 amazon_AMI httpd24 * Up to
(excluding)
2.4.58-1.101.amzn1
运行在以下环境
系统 anolis_os_23 httpd * Up to
(excluding)
2.4.58-1
运行在以下环境
系统 fedoraproject fedora 38 -
运行在以下环境
系统 fedora_37 mod_http2 * Up to
(excluding)
2.0.25-1.fc37
运行在以下环境
系统 fedora_38 mod_http2 * Up to
(excluding)
2.0.25-1.fc38
运行在以下环境
系统 fedora_39 mod_http2 * Up to
(excluding)
2.0.25-1.fc39
运行在以下环境
系统 kylinos_aarch64_V10SP2 httpd * Up to
(excluding)
2.4.43-23.p01.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP1 httpd * Up to
(excluding)
2.4.43-8.p08.a.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP3 httpd * Up to
(excluding)
2.4.43-23.p01.a.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 httpd * Up to
(excluding)
2.4.43-23.p01.ky10
运行在以下环境
系统 ubuntu_20.04 apache2 * Up to
(excluding)
2.4.41-4ubuntu3.15
运行在以下环境
系统 ubuntu_22.04 apache2 * Up to
(excluding)
2.4.52-1ubuntu4.7
阿里云评分
5.4
  • 攻击路径
    本地
  • 攻击复杂度
    困难
  • 权限要求
    管控权限
  • 影响范围
    有限影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-400 未加控制的资源消耗(资源穷尽)
阿里云安全产品覆盖情况