Project

General

Profile

Actions

Security #5926

closed

http2: evasion by splitting header fields over frames

Added by Philippe Antoine almost 2 years ago. Updated 10 months ago.

Status:
Closed
Priority:
Normal
Target version:
Affected Versions:
Label:
Git IDs:

aff54f29f8c3f583ae0524a661aa90dc7a2d3f92

Severity:
HIGH
Disclosure Date:

Description

Beginning in a headers frame, and continuing in so-called continuation frames, with reassembly needed to be done...

Then, we need to avoid quadratic complexity of Huffman decoding as golang CVE 2023-1571


Files

cont.pcap (2.53 KB) cont.pcap Philippe Antoine, 12/19/2023 08:33 PM

Subtasks 2 (0 open2 closed)

Security #6717: http2: evasion by splitting header fields over frames (7.0.x backport)ClosedPhilippe AntoineActions
Security #6751: http2: evasion by splitting header fields over frames (6.0.x backport)ClosedPhilippe AntoineActions
Actions #1

Updated by Philippe Antoine over 1 year ago

  • Target version changed from TBD to 8.0.0-beta1
Actions #2

Updated by Philippe Antoine about 1 year ago

  • Priority changed from Normal to Low
Actions #3

Updated by Philippe Antoine about 1 year ago

Attaching a sample pcap

There should be no anomaly and we should have the request header namenamenamenamenamenamenamenamenamename: valuevaluevaluevaluevaluevaluevaluevaluevaluevaluevaluevaluevaluevaluevaluevaluevaluevaluevaluevalue

Actions #4

Updated by Philippe Antoine 11 months ago

  • Tracker changed from Bug to Security
  • Severity set to MODERATE

Evasion is a security issue, right ? Which severity ?
An attacker can hide its HTTP2 headers to Suricata now...

Actions #5

Updated by Philippe Antoine 11 months ago

  • Priority changed from Low to Normal
Actions #6

Updated by Philippe Antoine 11 months ago

  • Status changed from New to In Review

Gitlab MR

Actions #7

Updated by Jason Ish 11 months ago

Philippe: Are backports required?

Actions #8

Updated by Philippe Antoine 11 months ago

Jason Ish wrote in #note-7:

Philippe: Are backports required?

I guess so.

That depends if this is assessed a security issue versus an evasion or a feature...

Actions #9

Updated by Victor Julien 11 months ago

  • Label Needs backport to 7.0 added
Actions #10

Updated by OISF Ticketbot 11 months ago

  • Subtask #6717 added
Actions #11

Updated by OISF Ticketbot 11 months ago

  • Label deleted (Needs backport to 7.0)
Actions #12

Updated by Jason Ish 11 months ago

  • Label Needs backport to 6.0 added
Actions #13

Updated by OISF Ticketbot 11 months ago

  • Subtask #6751 added
Actions #14

Updated by OISF Ticketbot 11 months ago

  • Label deleted (Needs backport to 6.0)
Actions #15

Updated by Victor Julien 11 months ago

  • CVE set to 2024-24568
Actions #16

Updated by Philippe Antoine 11 months ago

  • Status changed from In Review to Closed
  • Git IDs updated (diff)
Actions #17

Updated by Philippe Antoine 11 months ago

  • Severity changed from MODERATE to HIGH

not critical because does not fit

evasions with a wide scope are considered to be in-scope

But High as Tier 1

Actions #18

Updated by Victor Julien 10 months ago

  • Private changed from Yes to No
Actions

Also available in: Atom PDF