View all vulnerabilities

CVE-2023-44487

gRPC-Go HTTP/2 Rapid Reset vulnerability

### ImpactIn affected releases of gRPC-Go, it is possible for an attacker to send HTTP/2 requests, cancel them, and send subsequent requests, which is valid by the HTTP/2 protocol, but would cause the gRPC-Go server to launch more concurrent method handlers than the configured maximum stream limit.### PatchesThis vulnerability was addressed by #6703 and has been included in patch releases: 1.56.3, 1.57.1, 1.58.3. It is also included in the latest release, 1.59.0.Along with applying the patch, users should also ensure they are using the `grpc.MaxConcurrentStreams` server option to apply a limit to the server's resources used for any single connection.### WorkaroundsNone.### References#6703

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
7.5
Score Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Versions
google.golang.org/grpc < 1.56.3; google.golang.org/grpc >= 1.57.0 < 1.57.1; google.golang.org/grpc >= 1.58.0 < 1.58.3
Severity
High
Ecosystem
GO
Publish Date
October 25, 2023
Modified Date
December 16, 2024