CVE-2024-45311
CVSS V2 None
CVSS V3 None
Description
Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. As of quinn-proto 0.11, it is possible for a server to `accept()`, `retry()`, `refuse()`, or `ignore()` an `Incoming` connection. However, calling `retry()` on an unvalidated connection exposes the server to a likely panic in the following situations: 1. Calling `refuse` or `ignore` on the resulting validated connection, if a duplicate initial packet is received. This issue can go undetected until a server's `refuse()`/`ignore()` code path is exercised, such as to stop a denial of service attack. 2. Accepting when the initial packet for the resulting validated connection fails to decrypt or exhausts connection IDs, if a similar initial packet that successfully decrypts and doesn't exhaust connection IDs is received. This issue can go undetected if clients are well-behaved. The former situation was observed in a real application, while the latter is only theoretical.
Overview
- CVE ID
- CVE-2024-45311
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-09-02T16:45:39.465Z
- Last Modified Date
- 2024-09-02T16:45:39.465Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/quinn-rs/quinn/security/advisories/GHSA-vr26-jcq5-fjj8 | x_refsource_CONFIRM |
https://github.com/quinn-rs/quinn/commit/e01609ccd8738bd438d86fa7185a0f85598cb58f | x_refsource_MISC |
https://github.com/quinn-rs/quinn/blob/bb02a12a8435a7732a1d762783eeacbb7e50418e/quinn-proto/src/endpoint.rs#L213 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-45311 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45311 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-09-03 13:07:53 | Added to TrackCVE |