Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames
Team Summary
Official summary from Internet Bug Bounty
Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames (CVE-2024-27316) Severity: Moderate HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion. Acknowledgements: finder: Bartek Nowotarski (https://nowotarski.info/) Full Security Advisory: https://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Details
Technical details and impact analysis
Related CVEs
Associated Common Vulnerabilities and Exposures
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$2580.00
Submitted
Weakness
Uncontrolled Resource Consumption