vulnerability
Red Hat: CVE-2023-44487: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | 10/10/2023 | 11/01/2023 | 03/10/2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
10/10/2023
Added
11/01/2023
Modified
03/10/2025
Description
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Solution(s)
redhat-upgrade-aspnetcore-runtime-6-0redhat-upgrade-aspnetcore-runtime-7-0redhat-upgrade-aspnetcore-targeting-pack-6-0redhat-upgrade-aspnetcore-targeting-pack-7-0redhat-upgrade-delveredhat-upgrade-delve-debuginforedhat-upgrade-delve-debugsourceredhat-upgrade-dotnetredhat-upgrade-dotnet-apphost-pack-6-0redhat-upgrade-dotnet-apphost-pack-6-0-debuginforedhat-upgrade-dotnet-apphost-pack-7-0redhat-upgrade-dotnet-apphost-pack-7-0-debuginforedhat-upgrade-dotnet-hostredhat-upgrade-dotnet-host-debuginforedhat-upgrade-dotnet-hostfxr-6-0redhat-upgrade-dotnet-hostfxr-6-0-debuginforedhat-upgrade-dotnet-hostfxr-7-0redhat-upgrade-dotnet-hostfxr-7-0-debuginforedhat-upgrade-dotnet-runtime-6-0redhat-upgrade-dotnet-runtime-6-0-debuginforedhat-upgrade-dotnet-runtime-7-0redhat-upgrade-dotnet-runtime-7-0-debuginforedhat-upgrade-dotnet-sdk-6-0redhat-upgrade-dotnet-sdk-6-0-debuginforedhat-upgrade-dotnet-sdk-6-0-source-built-artifactsredhat-upgrade-dotnet-sdk-7-0redhat-upgrade-dotnet-sdk-7-0-debuginforedhat-upgrade-dotnet-sdk-7-0-source-built-artifactsredhat-upgrade-dotnet-targeting-pack-6-0redhat-upgrade-dotnet-targeting-pack-7-0redhat-upgrade-dotnet-templates-6-0redhat-upgrade-dotnet-templates-7-0redhat-upgrade-dotnet6-0-debuginforedhat-upgrade-dotnet6-0-debugsourceredhat-upgrade-dotnet7-0-debuginforedhat-upgrade-dotnet7-0-debugsourceredhat-upgrade-go-toolsetredhat-upgrade-golangredhat-upgrade-golang-binredhat-upgrade-golang-docsredhat-upgrade-golang-miscredhat-upgrade-golang-raceredhat-upgrade-golang-srcredhat-upgrade-golang-testsredhat-upgrade-grafanaredhat-upgrade-grafana-debuginforedhat-upgrade-grafana-debugsourceredhat-upgrade-libnghttp2redhat-upgrade-libnghttp2-debuginforedhat-upgrade-libnghttp2-develredhat-upgrade-netstandard-targeting-pack-2-1redhat-upgrade-nghttp2redhat-upgrade-nghttp2-debuginforedhat-upgrade-nghttp2-debugsourceredhat-upgrade-nginxredhat-upgrade-nginx-all-modulesredhat-upgrade-nginx-coreredhat-upgrade-nginx-core-debuginforedhat-upgrade-nginx-debuginforedhat-upgrade-nginx-debugsourceredhat-upgrade-nginx-filesystemredhat-upgrade-nginx-mod-develredhat-upgrade-nginx-mod-http-image-filterredhat-upgrade-nginx-mod-http-image-filter-debuginforedhat-upgrade-nginx-mod-http-perlredhat-upgrade-nginx-mod-http-perl-debuginforedhat-upgrade-nginx-mod-http-xslt-filterredhat-upgrade-nginx-mod-http-xslt-filter-debuginforedhat-upgrade-nginx-mod-mailredhat-upgrade-nginx-mod-mail-debuginforedhat-upgrade-nginx-mod-streamredhat-upgrade-nginx-mod-stream-debuginforedhat-upgrade-nodejsredhat-upgrade-nodejs-debuginforedhat-upgrade-nodejs-debugsourceredhat-upgrade-nodejs-develredhat-upgrade-nodejs-docsredhat-upgrade-nodejs-full-i18nredhat-upgrade-nodejs-libsredhat-upgrade-nodejs-libs-debuginforedhat-upgrade-nodejs-nodemonredhat-upgrade-nodejs-packagingredhat-upgrade-nodejs-packaging-bundlerredhat-upgrade-npmredhat-upgrade-rhc-worker-scriptredhat-upgrade-tomcatredhat-upgrade-tomcat-admin-webappsredhat-upgrade-tomcat-docs-webappredhat-upgrade-tomcat-el-3-0-apiredhat-upgrade-tomcat-jsp-2-3-apiredhat-upgrade-tomcat-libredhat-upgrade-tomcat-servlet-4-0-apiredhat-upgrade-tomcat-webappsredhat-upgrade-toolboxredhat-upgrade-toolbox-debuginforedhat-upgrade-toolbox-debugsourceredhat-upgrade-toolbox-testsredhat-upgrade-varnishredhat-upgrade-varnish-develredhat-upgrade-varnish-docsredhat-upgrade-varnish-modulesredhat-upgrade-varnish-modules-debuginforedhat-upgrade-varnish-modules-debugsource
References
- NVD-CVE-2023-44487
- REDHAT-RHSA-2023:5706
- REDHAT-RHSA-2023:5707
- REDHAT-RHSA-2023:5708
- REDHAT-RHSA-2023:5709
- REDHAT-RHSA-2023:5710
- REDHAT-RHSA-2023:5711
- REDHAT-RHSA-2023:5712
- REDHAT-RHSA-2023:5713
- REDHAT-RHSA-2023:5714
- REDHAT-RHSA-2023:5715
- REDHAT-RHSA-2023:5721
- REDHAT-RHSA-2023:5738
- REDHAT-RHSA-2023:5749
- REDHAT-RHSA-2023:5764
- REDHAT-RHSA-2023:5765
- REDHAT-RHSA-2023:5769
- REDHAT-RHSA-2023:5770
- REDHAT-RHSA-2023:5803
- REDHAT-RHSA-2023:5835
- REDHAT-RHSA-2023:5837
- REDHAT-RHSA-2023:5838
- REDHAT-RHSA-2023:5849
- REDHAT-RHSA-2023:5850
- REDHAT-RHSA-2023:5863
- REDHAT-RHSA-2023:5864
- REDHAT-RHSA-2023:5866
- REDHAT-RHSA-2023:5867
- REDHAT-RHSA-2023:5869
- REDHAT-RHSA-2023:5924
- REDHAT-RHSA-2023:5928
- REDHAT-RHSA-2023:5929
- REDHAT-RHSA-2023:5930
- REDHAT-RHSA-2023:5989
- REDHAT-RHSA-2023:6020
- REDHAT-RHSA-2023:6057
- REDHAT-RHSA-2023:6077
- REDHAT-RHSA-2023:6120
- REDHAT-RHSA-2023:6746
- REDHAT-RHSA-2023:7205
- REDHAT-RHSA-2024:1444

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.