Vulnerability Details : CVE-2024-22189
quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.
Products affected by CVE-2024-22189
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-22189
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 21 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-22189
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
GitHub, Inc. | 2024-04-04 |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
N/A
|
N/A
|
RedHat-CVE-2024-22189 | 2024-04-05 |
CWE ids for CVE-2024-22189
-
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2024-22189
-
https://www.youtube.com/watch?v=JqXtYcZAtIA&t=3683s
IETF 119: QUIC (QUIC) 2024-03-19 23:30 - YouTube
-
https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management
Exploiting QUIC’s Connection ID Management | Marten Seemann
-
https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478
Memory Exhaustion Attack against QUIC's Connection ID Mechanism · Advisory · quic-go/quic-go · GitHub
-
https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a
close connection when an abnormally large number of frames are queued… · quic-go/quic-go@4a99b81 · GitHub
Jump to