SB2024021205 - Multiple vulnerabilities in Envoy
Published: February 12, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2024-23322)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error when idle and request per try timeout occur within the backoff interval. A remote attacker can cause a denial of service condition on the target system.
2) NULL pointer dereference (CVE-ID: CVE-2024-23327)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in proxy protocol when command type of LOCAL. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
3) Uncaught Exception (CVE-ID: CVE-2024-23325)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to uncaught exception in proxy protocol when using an address type that is not supported by the OS. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
4) Improper Authentication (CVE-ID: CVE-2024-23324)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an authentication bypass when proxy protocol filter sets invalid UTF-8 metadata. A remote attacker can bypass external authentication by downstream connections that use PROXY protocol.
5) Inefficient CPU Computation (CVE-ID: CVE-2024-23323)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the excessive CPU usage when URI template matcher is configured using regex. A remote attacker can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-6p83-mfmh-qv38
- https://github.com/envoyproxy/envoy/commit/843f9e6a123ed47ce139b421c14e7126f2ac685e
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-4h5x-x9vh-m29j
- https://github.com/envoyproxy/envoy/commit/63895ea8e3cca9c5d3ab4c5c128ed1369969d54a
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-5m7c-mrwr-pm26
- https://github.com/envoyproxy/envoy/commit/bacd3107455b8d387889467725eb72aa0d5b5237
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-gq3v-vvhj-96j6
- https://github.com/envoyproxy/envoy/commit/29989f6cc8bfd8cd2ffcb7c42711eb02c7a5168a
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-x278-4w4x-r7ch
- https://github.com/envoyproxy/envoy/commit/71eeee8f0f0132f39e402b0ee23b361ee2f4e645