SB2024120801 - Gentoo update for HashiCorp Consul



SB2024120801 - Gentoo update for HashiCorp Consul

Published: December 8, 2024

Security Bulletin ID SB2024120801
Severity
High
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

High 38% Medium 38% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Resource exhaustion (CVE-ID: CVE-2023-1297)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.


2) Improper access control (CVE-ID: CVE-2023-2816)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in Lua extension. A remote user with service:write ACL permissions for an upstream service can modify Envoy proxy config for downstream services without equivalent permissions for those services.


3) Resource exhaustion (CVE-ID: CVE-2023-44487)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improperly control of consumption for internal resources when handling HTTP/2 requests with compressed HEADERS frames. A remote attacker can send a sequence of compressed HEADERS frames followed by RST_STREAM frames and perform a denial of service (DoS) attack, a.k.a. "Rapid Reset".

Note, the vulnerability is being actively exploited in the wild.


4) Use-after-free (CVE-ID: CVE-2024-23322)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error when idle and request per try timeout occur within the backoff interval. A remote attacker can cause a denial of service condition on the target system.


5) Inefficient CPU Computation (CVE-ID: CVE-2024-23323)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the excessive CPU usage when URI template matcher is configured using regex. A remote attacker can perform a denial of service (DoS) attack.


6) Improper Authentication (CVE-ID: CVE-2024-23324)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an authentication bypass when proxy protocol filter sets invalid UTF-8 metadata. A remote attacker can bypass external authentication by downstream connections that use PROXY protocol.


7) Uncaught Exception (CVE-ID: CVE-2024-23325)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to uncaught exception in proxy protocol when using an address type that is not supported by the OS. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


8) NULL pointer dereference (CVE-ID: CVE-2024-23327)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in proxy protocol when command type of LOCAL. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.