{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-45807","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-09-09T14:23:07.504Z","datePublished":"2024-09-19T23:34:28.938Z","dateUpdated":"2024-09-20T17:26:33.330Z"},"containers":{"cna":{"title":"oghttp2 crash on OnBeginHeadersForStream in envoy","problemTypes":[{"descriptions":[{"cweId":"CWE-670","lang":"en","description":"CWE-670: Always-Incorrect Control Flow Implementation","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/envoyproxy/envoy/security/advisories/GHSA-qc52-r4x5-9w37","tags":["x_refsource_CONFIRM"],"url":"https://github.com/envoyproxy/envoy/security/advisories/GHSA-qc52-r4x5-9w37"}],"affected":[{"vendor":"envoyproxy","product":"envoy","versions":[{"version":">= 1.31.0, < 1.31.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-09-19T23:34:28.938Z"},"descriptions":[{"lang":"en","value":"Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's 1.31 is using `oghttp` as the default HTTP/2 codec, and there are potential bugs around stream management in the codec. To resolve this Envoy will switch off the `oghttp2` by default. The impact of this issue is that envoy will crash. This issue has been addressed in release version 1.31.2. All users are advised to upgrade. There are no known workarounds for this issue."}],"source":{"advisory":"GHSA-qc52-r4x5-9w37","discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"envoyproxy","product":"envoy","cpes":["cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.31.0","status":"affected","lessThan":"1.31.2","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-20T17:25:59.102708Z","id":"CVE-2024-45807","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-20T17:26:33.330Z"}}]}}