SB2024092023 - Istio update for Envoy
Published: September 20, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Resource management error (CVE-ID: CVE-2024-45807)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper stream management when using Oghttp with the default HTTP/2 codec. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
2) Improper Output Neutralization for Logs (CVE-ID: CVE-2024-45808)
The vulnerability allows a remote attacker to inject arbitrary content into the log files.
The vulnerability exists due to insufficient validation of the REQUESTED_SERVER_NAME field. A remote attacker can inject unexpected content into access logs.
3) Input validation error (CVE-ID: CVE-2024-45806)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to software considers all RFC1918 private address ranges as internal. A remote attacker can manipulate Envoy headers and gain unauthorized access or perform other malicious actions within the mesh.
4) NULL pointer dereference (CVE-ID: CVE-2024-45809)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in JWT filter. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
5) Resource management error (CVE-ID: CVE-2024-45810)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the HTTP async client when handling sendLocalReply in WebSocket upgrade requests. A remote attacker can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.