vulnerability
FreeBSD: VID-f25a34b1-910d-11ee-a1a2-641c67a117d8 (CVE-2023-44487): varnish -- HTTP/2 Rapid Reset Attack
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Dec 2, 2023 | Dec 2, 2023 | Dec 10, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Dec 2, 2023
Added
Dec 2, 2023
Modified
Dec 10, 2025
Description
Varnish Cache Project reports: A denial of service attack can be performed on Varnish Cache servers that have the HTTP/2 protocol turned on. An attacker can create a large volume of streams and immediately reset them without ever reaching the maximum number of concurrent streams allowed for the session, causing the Varnish server to consume unnecessary resources processing requests for which the response will not be delivered.
Solutions
freebsd-upgrade-package-varnish7freebsd-upgrade-package-varnish6freebsd-upgrade-package-jenkinsfreebsd-upgrade-package-jenkins-ltsfreebsd-upgrade-package-traefikfreebsd-upgrade-package-h2ofreebsd-upgrade-package-h2o-devel
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.