Skip to content

State exhaustion DoS

Low
kazuho published GHSA-9h2v-5p8c-4wrr Dec 12, 2023

Package

quicly

Affected versions

commits up to 43f86e5

Patched versions

commit db5d54a and above

Description

Impact

Quicly up to commit 43f86e5 is susceptible to a state exhaustion attack.

A remote attacker can exploit this vulnerability to progressively increase the memory retained by the QUIC stack. This may lead to applications using quicly to abort due to memory exhaustion.

Patches

The vulnerability has been addressed in commit db5d54a. Users should upgrade quicly to commit db5d54a or above.

References

This vulnerability is an instance of a missspecification (or an oversight) of the QUIC version 1 protocol, which was reported by @marten-seemann.

See also: corresponding H2O security advisory.

Severity

Low
3.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

CVE ID

CVE-2023-50247

Weaknesses

No CWEs