So entschärfen Sie die HTTP/2-Rapid-Reset-Sicherheitslücke (EN)

Wissensdatenbanken

So entschärfen Sie die HTTP/2-Rapid-Reset-Sicherheitslücke (EN)


Icons/System/eye-open Created with Sketch. 187 Ansichten 13.10.2023 Web / Webhosting
Informationen zur Übersetzung

Diese Übersetzung wurde durch unseren Partner SYSTRAN automatisch erstellt. In manchen Fällen können ungenaue Formulierungen verwendet worden sein, z.B. bei der Beschriftung von Schaltflächen oder technischen Details. Bitte ziehen Sie im Zweifelsfall die englische oder französische Fassung der Anleitung zu Rate. Möchten Sie mithelfen, diese Übersetzung zu verbessern? Dann nutzen Sie dazu bitte den Button "Beitragen" auf dieser Seite.

Introduction

On October 10th 2023, researchers and vendors disclosed an HTTP/2 protocol behavior allowing to perform a denial-of-service (DoS) using Layer 7.

Labelled CVE-2023-44487, an attacker can leverage this issue to create additional load on web servers which could lead to denial of service by using HTTP/2 protocol.

An attacker can exploit the vulnerability by quickly initiating and cancelling a large number of HTTP/2 streams over an established connection causing excessive resource consumption server-side with minimal client-side attacker cost. This technically circumvents the server's concurrent stream maximum limit because incoming streams are reset faster than subsequent streams arrive.

Several variations using different query orders resulted from the first behaviour identified, allowing to bypass mitigations based on the rate of inbound reset streams.

Impacts on OVHcloud products

Range of productsProductsImpact
Web hostingCDNNot impacted
Web CloudWeb hosting - Cloud hostingNot impacted
Bare Metal CloudNetwork - Load BalancerNot impacted

How to mitigate the vulnerability

OVHcloud-initiated mitigation

If you are using any of the services above, OVHcloud took the appropriate actions to mitigate the vulnerability and you are not impacted.

Customer-initiated mitigation

In the case your website is hosted on a Cloud Instance (Public Cloud or Hosted Private Cloud) or on a Bare Metal Server having HTTP/2 enabled and exposed on the Internet, we recommend you to apply the latest upgrades to improve your resiliency.

The main vendors released advisories and statements in order to guide you and provide more information.

External references

National vulnerability database - CVE-2023-44487 Detail

CVE Numbering Authorities - CVE-2023-44487

Qualys community - CVE-2023-44487 HTTP/2 Rapid Reset Attack

Zugehörige Artikel