First published: Wed Jul 06 2022(Updated: )
** DISPUTED ** quic-go through 0.27.0 allows remote attackers to cause a denial of service (CPU consumption) via a Slowloris variant in which incomplete QUIC or HTTP/3 requests are sent. This occurs because mtu_discoverer.go misparses the MTU Discovery service and consequently overflows the probe timer. NOTE: the vendor's position is that this behavior should not be listed as a vulnerability on the CVE List.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
quic-go | <=0.27.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2022-30591.
CVE-2022-30591 has a severity rating of 7.5 (High).
quic-go through 0.27.0 allows remote attackers to cause a denial of service by sending incomplete QUIC or HTTP/3 requests, which leads to CPU consumption.
To address CVE-2022-30591, consider updating to a version of quic-go beyond 0.27.0 that resolves the issue.
Yes, you can find more information about CVE-2022-30591 at the following link: [Github - mtu_discoverer.go](https://github.com/lucas-clemente/quic-go/blob/84e03e59760ceee37359688871bb0688fcc4e98f/mtu_discoverer.go).