RSS   Podatności dla 'Swiftnio http\/2'   RSS

2022-03-10
 
CVE-2022-0618

NVD-CWE-Other
 

 
A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted HTTP/2 frame. This vulnerability is caused by a logical error when parsing a HTTP/2 HEADERS or HTTP/2 PUSH_PROMISE frame where the frame contains padding information without any other data. This logical error caused confusion about the size of the frame, leading to a parsing error. This parsing error immediately crashes the entire process. Sending a HEADERS frame or PUSH_PROMISE frame with HTTP/2 padding information does not require any special permission, so any HTTP/2 connection peer may send such a frame. For clients, this means any server to which they connect may launch this attack. For servers, anyone they allow to connect to them may launch such an attack. The attack is low-effort: it takes very little resources to send an appropriately crafted frame. The impact on availability is high: receiving the frame immediately crashes the server, dropping all in-flight connections and causing the service to need to restart. It is straightforward for an attacker to repeatedly send appropriately crafted frames, so attackers require very few resources to achieve a substantial denial of service. The attack does not have any confidentiality or integrity risks in and of itself: swift-nio-http2 is parsing the frame in memory-safe code, so the crash is safe. However, sudden process crashes can lead to violations of invariants in services, so it is possible that this attack can be used to trigger an error condition that has confidentiality or integrity risks. The risk can be mitigated if untrusted peers can be prevented from communicating with the service. This mitigation is not available to many services. The issue is fixed by rewriting the parsing code to correctly handle the condition. The issue was found by automated fuzzing by oss-fuzz.

 

 >>> Vendor: Apple 126 Produkty
IOS
Appleshare
A UX
JAVA
Mac os
Mac os x
Ichat server
Appleshare mail server
Webobjects
Mac os runtime for java
CUPS
Quicktime
Personal web sharing
Claris emailer
Mac os x server
Tcp ip configuration utility
Darwin streaming server
Quicktime streaming server
Quicktime darwin mp3 broadcaster
802.11n
Safari
Afp server
ICAL
Ichat
Ichat av
Remote desktop
Apache mod digest apple
Xcode
Itunes
Airport express
Airport extreme
Quicktime pictureviewer
Applescript
Terminal
Keynote
Airport card
MAIL
Weblog server
Textedit
Imageio
XSAN
Bomarchivehelper
Iphoto
Preview
Webkit
Minimal slp service agent
Software update
Cfnetwork
Installer
Webcore
Instant message framework
Mdnsresponder
Imovie
Mac os x preview.app
Server manager
Xserve lights-out management
Iphone
Pdfkit
Quartz composer
Core audio technologies
Iphone os
Mobile safari
Aperture
Podcast producer
Apple airport extreme base station
Core image fun house
Xcode tools
Carboncore
Coregraphics
Data detectors engine
Quicklook
Bonjour
Motion
Ipod touch
Iphone configuration web utility
Quicktime mpeg-2 playback component
Airport express base station firmware
Airport extreme base station firmware
Time capsule
Garageband
Java 1.4
Java 1.5
Java 1.6
Airport utility
Libsecurity
Apple type services
Apple tv
Ipad2
Apple remote desktop
Swift
Olive toast documents pro file viewer
Airport base station firmware
Os x server
Pages
Boot camp
Watch os
Watchos
Iwork
Numbers
Ibooks author
Zobacz wszystkie produkty dla producenta Apple


Copyright 2024, cxsecurity.com

 

Back to Top