HTTP2: Google Golang HTTP2 CONTINUATION Denial of Service

This signature detects attempts to exploit a known vulnerability against HTTP/2 module of Google Golang CONTINUATION. A successful attack can result in a denial-of-service condition.

Extended Description

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

References

CVE: CVE-2023-45288

Short Name
HTTP2:GOOGLE-GLNG-DOS
Severity
Major
Recommended
True
Recommended Action
None
Category
HTTP2
Keywords
CONTINUATION CVE-2023-45288 Denial Golang Google HTTP2 Service of
Release Date
07/04/2024
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

Sigpack Version
3720
False Positive
Unknown

Found a potential security threat?