Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-45311
HistorySep 02, 2024 - 4:45 p.m.

CVE-2024-45311 Denial of service in quinn-proto when using `Endpoint::retry()`

2024-09-0216:45:39
CWE-670
GitHub_M
github.com
4
cve-2024-45311
quinn-proto
async-compatible
ietf quic
denial of service
panic
connection
decrypt
connection ids

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

High

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. As of quinn-proto 0.11, it is possible for a server to accept(), retry(), refuse(), or ignore() an Incoming connection. However, calling retry() on an unvalidated connection exposes the server to a likely panic in the following situations: 1. Calling refuse or ignore on the resulting validated connection, if a duplicate initial packet is received. This issue can go undetected until a server’s refuse()/ignore() code path is exercised, such as to stop a denial of service attack. 2. Accepting when the initial packet for the resulting validated connection fails to decrypt or exhausts connection IDs, if a similar initial packet that successfully decrypts and doesn’t exhaust connection IDs is received. This issue can go undetected if clients are well-behaved. The former situation was observed in a real application, while the latter is only theoretical.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:quinn_project:quinn:*:*:*:*:*:rust:*:*"
    ],
    "vendor": "quinn_project",
    "product": "quinn",
    "versions": [
      {
        "status": "affected",
        "version": "0.11.0",
        "lessThan": "0.11.7",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

High

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-45311