vulnerability

FreeBSD: VID-f25a34b1-910d-11ee-a1a2-641c67a117d8 (CVE-2023-44487): varnish -- HTTP/2 Rapid Reset Attack

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Dec 2, 2023
Added
Dec 2, 2023
Modified
Dec 10, 2025

Description

Varnish Cache Project reports: A denial of service attack can be performed on Varnish Cache servers that have the HTTP/2 protocol turned on. An attacker can create a large volume of streams and immediately reset them without ever reaching the maximum number of concurrent streams allowed for the session, causing the Varnish server to consume unnecessary resources processing requests for which the response will not be delivered.

Solutions

freebsd-upgrade-package-varnish7freebsd-upgrade-package-varnish6freebsd-upgrade-package-jenkinsfreebsd-upgrade-package-jenkins-ltsfreebsd-upgrade-package-traefikfreebsd-upgrade-package-h2ofreebsd-upgrade-package-h2o-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.