We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-31079

NGINX HTTP/3 QUIC vulnerability



Assignerf5
Reserved2024-05-14
Published2024-05-29
Updated2024-08-02

Description

When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate or cause other potential impact. This attack requires that a request be specifically timed during the connection draining process, which the attacker has no visibility and limited influence over.



MEDIUM: 4.8CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unknown

1.25.0 before 1.26.1
affected

Default status
unknown

R30 before R32
affected

Credits

F5 acknowledges Nils Bars of CISPA for bringing this issue to our attention and following the highest standards of coordinated disclosure. 0x40049aad10

References

https://my.f5.com/manage/s/article/K000139611 vendor-advisory

https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/

http://www.openwall.com/lists/oss-security/2024/05/30/4

https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/

cve.org CVE-2024-31079

nvd.nist.gov CVE-2024-31079

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.