CVE-2024-45396

high

Description

Quicly is an IETF QUIC protocol implementation. Quicly up to commtit d720707 is susceptible to a denial-of-service attack. A remote attacker can exploit these bugs to trigger an assertion failure that crashes process using quicly. The vulnerability is addressed with commit 2a95896104901589c495bc41460262e64ffcad5c.

References

https://github.com/h2o/quicly/security/advisories/GHSA-mp3c-h5gg-mm6p

https://github.com/h2o/quicly/commit/2a95896104901589c495bc41460262e64ffcad5c

Details

Source: Mitre, NVD

Published: 2024-10-11

Updated: 2024-11-12

Risk Information

CVSS v2

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Severity: High

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Severity: High