CVE-2023-39325

CVSS 3.1 Score 7.5 of 10 (high)

Details

Published Oct 11, 2023
Updated: Apr 28, 2024
CWE ID 770

Summary

CVE-2023-39325 is a vulnerability that affects various products, including s5UiSY, qeEKVS, and tK3bf3. It is categorized as a high-severity vulnerability with a base score of 7.5. The vulnerability occurs when a malicious HTTP/2 client rapidly creates and resets requests, leading to excessive server resource consumption. The fix for this issue involves bounding the number of simultaneously executing handler goroutines to the stream concurrency limit. The default stream concurrency limit is set at 250 streams per HTTP/2 connection, but it can be adjusted using the golang.org/x/net/http2 package. If the request queue grows too large, the server will terminate the connection. This vulnerability poses a potential danger to organizations as it can result in denial-of-service attacks and impact server availability.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.

Share

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-39325 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options