SB2024052109 - Multiple vulnerabilities in HashiCorp Consul



SB2024052109 - Multiple vulnerabilities in HashiCorp Consul

Published: May 21, 2024 Updated: May 23, 2024

Security Bulletin ID SB2024052109
Severity
Medium
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Resource exhaustion (CVE-ID: CVE-2024-28180)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources when decompressing JWE with Decrypt or DecryptMulti. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.


2) Untrusted search path (CVE-ID: CVE-2024-24787)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to usage of an untrusted search path in md/go. A remote attacker can trick the victim to build a Go module which contains CGO to trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive.



3) Infinite loop (CVE-ID: CVE-2024-24788)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop when processing DNS responses. A remote attacker can send a specially crafted DNS response to the application and cause denial of service conditions.


4) Resource exhaustion (CVE-ID: CVE-2024-27919)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient limitations in oghttp codec placed on the amount of CONTINUATION frames that can be sent within a single HTTP/2 stream. A remote attacker can send a sequence of CONTINUATION frames without the END_HEADERS bit set causing unlimited memory consumption.

5) Incorrect Check of Function Return Value (CVE-ID: CVE-2024-32475)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect check of function return value when using auto_sni with :authority header longer than 255 characters. A remote attacker can perform a denial of service (DoS) attack.


6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-8559)

The vulnerability allows a remote privileged user to execute arbitrary code.

The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.


7) Resource exhaustion (CVE-ID: CVE-2023-45288)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single HTTP/2 stream. A remote attacker can send specially crafted HTTP/2 requests to the server and perform a denial of service (DoS) attack.

Remediation

Install update from vendor's website.