Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » New HTTP/2 vulnerability exposes web servers to DoS attacks
    Cyber Security

    New HTTP/2 vulnerability exposes web servers to DoS attacks

    techempireBy techempire3 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportApril 4, 2024Editorial DepartmentVulnerabilities/Internet Protocol

    HTTP/2 vulnerabilities

    New research has discovered that the CONTINUATION frame in the HTTP/2 protocol can be exploited to conduct a denial of service (DoS) attack.

    The technology is codenamed HTTP/2 continues to flood Security researcher Bartek Nowotarski reported this issue to the CERT Coordination Center (CERT/CC) on January 25, 2024.

    “Many HTTP/2 implementations do not properly limit or sanitize the number of CONTINUATION frames sent in a single stream,” CERT/CC said in an April 3, 2024 advisory.

    “An attacker able to send packets to a target server can send a stream of CONTINUATION frames that will not be appended to the header list in memory, but will still be processed and decoded by the server, or will be appended to the header list. This results in an Out of Memory (OOM) crash.”

    Like HTTP/1, HTTP/2 uses header fields in requests and responses. These header fields can contain header lists, which are in turn serialized and broken into header chunks. The header blocks are then divided into block fragments and transmitted in headers or so-called contiguous frames.

    The documentation for RFC 7540 reads: “The CONTINUATION frame (type = 0x9) is used to continue a series of header block fragments.”

    Internet security

    “Any number of CONTINUATION frames may be sent as long as the previous frame is on the same stream and was a HEADERS, PUSH_PROMISE, or CONTINUATION frame without the END_HEADERS flag set.”

    The last frame containing headers will set the END_HEADERS flag, which signals to the remote endpoint that it is the end of a header block.

    Nowotarski said that CONTINUATION Flood is a class of vulnerabilities in multiple HTTP/2 protocol implementations that poses a more serious threat than the rapid reset attack exposed in October 2023.

    “A single machine (and in some cases, just a TCP connection or a few frames) has the potential to disrupt server availability, with consequences including server crashes and significant performance degradation,” the researchers said. “Notable Yes, the requests that constitute the attack are not visible in the HTTP access logs.”

    The core of the vulnerability is related to incorrect handling of headers and multiple CONTINUATION frames, which paves the way for a DoS condition.

    In other words, an attacker could use a vulnerable implementation to initiate a new HTTP/2 stream against a target server and send HEADERS and CONTINUATION frames without the END_HEADERS flag set, thereby creating the never-ending request required by the HTTP/2 server. The terminated header stream is parsed and stored in memory.

    While specific results vary by implementation, the impact ranges from crashing immediately after sending a few HTTP/2 frames, to out-of-memory crashes, to CPU exhaustion, impacting server availability.

    “RFC 9113 […] Mentioned that multiple security issues may arise if CONTINUATION frames are not handled correctly,” Nowotarski said.

    Internet security

    “Also, it does not mention the specific circumstances of sending CONTINUATION frames without the final END_HEADERS flag, which may have an impact on affected servers.”

    This issue affects multiple projects such as amphp/http (CVE-2024-2653), Apache HTTP Server (CVE-2024-27316), Apache Tomcat (CVE-2024-24549), Apache Traffic Server (CVE-2024-31309) , Envoy proxy (CVE-2024-27919 and CVE-2024-30255), Golang (CVE-2023-45288), h2 Rust crate, nghttp2 (CVE-2024-28182), Node.js (CVE-2024-278324- 24-2 Tempesta FW (CVE-2024-2758).

    Users are advised to upgrade affected software to the latest version to mitigate potential threats. If there is no fix, it is recommended to consider temporarily disabling HTTP/2 on the server.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.