{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-1765","assignerOrgId":"a22f1246-ba21-4bb4-a601-ad51614c1513","state":"PUBLISHED","assignerShortName":"cloudflare","dateReserved":"2024-02-22T16:04:47.125Z","datePublished":"2024-03-12T18:04:54.915Z","dateUpdated":"2024-08-01T18:48:22.108Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","packageName":"quiche","platforms":["Rust"],"product":"quiche","vendor":"Cloudflare","versions":[{"lessThanOrEqual":"<0.19.1","status":"affected","version":"0.15.0","versionType":"semver"},{"lessThan":"<0.20.1","status":"affected","version":"0.20.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Marten Seeman (@marten-seemann)"}],"datePublic":"2024-03-12T18:01:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p><span style=\"background-color: transparent;\">Cloudflare Quiche (through version 0.19.1/0.20.0) was affected by an unlimited resource allocation vulnerability causing rapid increase of memory usage of the system </span><span style=\"background-color: transparent;\">running quiche server or client</span><span style=\"background-color: transparent;\">.<br></span><span style=\"background-color: transparent;\">A remote attacker could take advantage of this vulnerability by repeatedly sending an unlimited number of 1-RTT CRYPTO frames after previously completing the QUIC handshake.<br>Exploitation was possible for the duration of the connection which could be extended by the attacker.&nbsp;<br></span><span style=\"background-color: transparent;\">quiche 0.19.2 and 0.20.1 are the earliest versions containing the fix for this issue.</span></p>"}],"value":"Cloudflare Quiche (through version 0.19.1/0.20.0) was affected by an unlimited resource allocation vulnerability causing rapid increase of memory usage of the system running quiche server or client.\nA remote attacker could take advantage of this vulnerability by repeatedly sending an unlimited number of 1-RTT CRYPTO frames after previously completing the QUIC handshake.\nExploitation was possible for the duration of the connection which could be extended by the attacker. \nquiche 0.19.2 and 0.20.1 are the earliest versions containing the fix for this issue.\n\n"}],"impacts":[{"capecId":"CAPEC-130","descriptions":[{"lang":"en","value":"CAPEC-130 Excessive Allocation"}]},{"capecId":"CAPEC-272","descriptions":[{"lang":"en","value":"CAPEC-272 Protocol Manipulation"}]},{"capecId":"CAPEC-125","descriptions":[{"lang":"en","value":"CAPEC-125 Flooding"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-400","description":"CWE-400 Uncontrolled Resource Consumption","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-770","description":"CWE-770 Allocation of Resources Without Limits or Throttling","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a22f1246-ba21-4bb4-a601-ad51614c1513","shortName":"cloudflare","dateUpdated":"2024-03-12T18:04:54.915Z"},"references":[{"url":"https://github.com/cloudflare/quiche/security/advisories/GHSA-78wx-jg4j-5j6g"}],"source":{"discovery":"EXTERNAL"},"title":"Unlimited resource allocation by QUIC CRYPTO frames flooding in quiche","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-1765","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-03-13T14:44:18.732134Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T18:00:25.467Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:48:22.108Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/cloudflare/quiche/security/advisories/GHSA-78wx-jg4j-5j6g","tags":["x_transferred"]}]}]}}