Learn about CVE-2023-36478 affecting Eclipse Jetty, allowing HTTP/2 HPACK header values to surpass size limits, potentially leading to remote denial of service attacks. Update to versions 11.0.16, 10.0.16, or 9.4.53 for mitigation.
This article provides detailed information about CVE-2023-36478, focusing on the HTTP/2 HPACK integer overflow and buffer allocation vulnerability in Eclipse Jetty.
Understanding CVE-2023-36478
CVE-2023-36478 is a high-severity vulnerability affecting versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52 of Eclipse Jetty, allowing for HTTP/2 HPACK header values to exceed their size limit due to an integer overflow.
What is CVE-2023-36478?
In Eclipse Jetty versions mentioned above, an integer overflow in
MetaDataBuilder.checkSize
enables HTTP/2 HPACK header values to surpass their size limit. This overflow can lead to remote denial of service attacks for users of HTTP/2.
The Impact of CVE-2023-36478
Users of HTTP/2 protocol are vulnerable to a remote denial of service attack due to the integer overflow in handling HPACK header values. This vulnerability can be exploited by malicious actors to disrupt services.
Technical Details of CVE-2023-36478
The vulnerability lies in the
MetaDataBuilder.checkSize
function, allowing for buffer allocations based on user-entered HPACK header values, potentially leading to a DoS attack.
Vulnerability Description
The flaw allows for user-entered HPACK header sizes to exceed limits, causing an integer overflow in determining header size and leading to large buffer allocations on the server, impacting HTTP/2 users.
Affected Systems and Versions
Eclipse Jetty versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52 are affected by this vulnerability, putting users of these versions at risk of a DoS attack.
Exploitation Mechanism
Malicious actors can exploit this flaw by providing specially crafted HPACK header values, causing the server to allocate large buffers, leading to service disruption.
Mitigation and Prevention
To address CVE-2023-36478, users are advised to take immediate steps and implement long-term security measures to protect their systems.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates