Assigner | mozilla |
Reserved | 2024-04-04 |
Published | 2024-04-16 |
Updated | 2024-06-21 |
Description
There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
Problem types
Denial of Service using HTTP/2 CONTINUATION frames
Product status
Credits
Bartek Nowotarski via CERT
References
https://bugzilla.mozilla.org/show_bug.cgi?id=1881183
https://kb.cert.org/vuls/id/421644 (VU#421644 - HTTP/2 CONTINUATION frames can be utilized for DoS attacks)
https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html
https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html
https://www.mozilla.org/security/advisories/mfsa2024-18/
https://www.mozilla.org/security/advisories/mfsa2024-19/
https://www.mozilla.org/security/advisories/mfsa2024-20/