Apache Traffic Server:HTTP/2 CONTINUATION 帧可用于 DoS 攻击 (CVE-2024-31309)

CVE编号

CVE-2024-31309

利用情况

暂无

补丁情况

N/A

披露时间

2024-04-10
漏洞描述
HTTP/2 CONTINUATION DoS attack can cause Apache Traffic Server to consume more resources on the server.  Version from 8.0.0 through 8.1.9, from 9.0.0 through 9.2.3 are affected.

Users can set a new setting (proxy.config.http2.max_continuation_frames_per_minute) to limit the number of CONTINUATION frames per minute.  ATS does have a fixed amount of memory a request can use and ATS adheres to these limits in previous releases.
Users are recommended to upgrade to versions 8.1.10 or 9.2.4 which fixes the issue.


解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 fedora_38 trafficserver * Up to
(excluding)
9.2.4-1.fc38
运行在以下环境
系统 fedora_39 trafficserver * Up to
(excluding)
9.2.4-1.fc39
运行在以下环境
系统 fedora_40 trafficserver * Up to
(excluding)
9.2.4-1.fc40
运行在以下环境
系统 fedora_EPEL_7 trafficserver * Up to
(excluding)
9.2.4-1.el7
运行在以下环境
系统 fedora_EPEL_8 trafficserver * Up to
(excluding)
9.2.4-1.el8
运行在以下环境
系统 fedora_EPEL_9 trafficserver * Up to
(excluding)
9.2.4-1.el9
CVSS3评分
N/A
  • 攻击路径
    N/A
  • 攻击复杂度
    N/A
  • 权限要求
    N/A
  • 影响范围
    N/A
  • 用户交互
    N/A
  • 可用性
    N/A
  • 保密性
    N/A
  • 完整性
    N/A
CWE-ID 漏洞类型
CWE-20 输入验证不恰当
阿里云安全产品覆盖情况