SB2024121911 - Multiple DoS vulnerabilities in Envoy
Published: December 19, 2024 Updated: December 23, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) NULL pointer dereference (CVE-ID: CVE-2024-53270)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error during the H/2 upstream reset. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
2) Resource management error (CVE-ID: CVE-2024-53271)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the application when handling HTTP/1.1 non-101 1xx responses. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://github.com/envoyproxy/envoy/pull/37743/commits/6cf8afda956ba67c9afad185b962325a5242ef02
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-q9qv-8j52-77p3
- https://github.com/envoyproxy/envoy/releases/tag/v1.29.12
- https://github.com/envoyproxy/envoy/releases/tag/v1.30.9
- https://github.com/envoyproxy/envoy/releases/tag/v1.31.5
- https://github.com/envoyproxy/envoy/commit/da56f6da63079baecef9183436ee5f4141a59af8
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-rmm5-h2wv-mg4f