cve-2024-37309
Vulnerability from cvelistv5
Published
2024-06-13 13:59
Modified
2024-08-02 03:50
Severity ?
EPSS score ?
Summary
CrateDB is a distributed SQL database. A high-risk vulnerability has been identified in versions prior to 5.7.2 where the TLS endpoint (port 4200) permits client-initiated renegotiation. In this scenario, an attacker can exploit this feature to repeatedly request renegotiation of security parameters during an ongoing TLS session. This flaw could lead to excessive consumption of CPU resources, resulting in potential server overload and service disruption. The vulnerability was confirmed using an openssl client where the command `R` initiates renegotiation, followed by the server confirming with `RENEGOTIATING`. This vulnerability allows an attacker to perform a denial of service attack by exhausting server CPU resources through repeated TLS renegotiations. This impacts the availability of services running on the affected server, posing a significant risk to operational stability and security. TLS 1.3 explicitly forbids renegotiation, since it closes a window of opportunity for an attack. Version 5.7.2 of CrateDB contains the fix for the issue.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cratedb:cratedb:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cratedb", "vendor": "cratedb", "versions": [ { "lessThan": "5.7.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37309", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-12T19:17:22.486657Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-12T19:19:58.771Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:56.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2" }, { "name": "https://github.com/crate/crate/commit/1dde03bdf031a20886065195527e368e4a3218b3", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/crate/crate/commit/1dde03bdf031a20886065195527e368e4a3218b3" }, { "name": "https://cratedb.com/docs/crate/reference/en/latest/appendices/release-notes/5.7.2.html", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cratedb.com/docs/crate/reference/en/latest/appendices/release-notes/5.7.2.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "crate", "vendor": "crate", "versions": [ { "status": "affected", "version": "\u003c 5.7.2" } ] } ], "descriptions": [ { "lang": "en", "value": "CrateDB is a distributed SQL database. A high-risk vulnerability has been identified in versions prior to 5.7.2 where the TLS endpoint (port 4200) permits client-initiated renegotiation. In this scenario, an attacker can exploit this feature to repeatedly request renegotiation of security parameters during an ongoing TLS session. This flaw could lead to excessive consumption of CPU resources, resulting in potential server overload and service disruption. The vulnerability was confirmed using an openssl client where the command `R` initiates renegotiation, followed by the server confirming with `RENEGOTIATING`. This vulnerability allows an attacker to perform a denial of service attack by exhausting server CPU resources through repeated TLS renegotiations. This impacts the availability of services running on the affected server, posing a significant risk to operational stability and security. TLS 1.3 explicitly forbids renegotiation, since it closes a window of opportunity for an attack. Version 5.7.2 of CrateDB contains the fix for the issue.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-13T13:59:05.807Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2" }, { "name": "https://github.com/crate/crate/commit/1dde03bdf031a20886065195527e368e4a3218b3", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/crate/crate/commit/1dde03bdf031a20886065195527e368e4a3218b3" }, { "name": "https://cratedb.com/docs/crate/reference/en/latest/appendices/release-notes/5.7.2.html", "tags": [ "x_refsource_MISC" ], "url": "https://cratedb.com/docs/crate/reference/en/latest/appendices/release-notes/5.7.2.html" } ], "source": { "advisory": "GHSA-x268-qpg6-w9g2", "discovery": "UNKNOWN" }, "title": "Client initialized Session-Renegotiation DoS" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37309", "datePublished": "2024-06-13T13:59:05.807Z", "dateReserved": "2024-06-05T20:10:46.498Z", "dateUpdated": "2024-08-02T03:50:56.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-37309\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-06-13T14:15:13.060\",\"lastModified\":\"2024-11-21T09:23:34.867\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"CrateDB is a distributed SQL database. A high-risk vulnerability has been identified in versions prior to 5.7.2 where the TLS endpoint (port 4200) permits client-initiated renegotiation. In this scenario, an attacker can exploit this feature to repeatedly request renegotiation of security parameters during an ongoing TLS session. This flaw could lead to excessive consumption of CPU resources, resulting in potential server overload and service disruption. The vulnerability was confirmed using an openssl client where the command `R` initiates renegotiation, followed by the server confirming with `RENEGOTIATING`. This vulnerability allows an attacker to perform a denial of service attack by exhausting server CPU resources through repeated TLS renegotiations. This impacts the availability of services running on the affected server, posing a significant risk to operational stability and security. TLS 1.3 explicitly forbids renegotiation, since it closes a window of opportunity for an attack. Version 5.7.2 of CrateDB contains the fix for the issue.\\n\"},{\"lang\":\"es\",\"value\":\"CrateDB es una base de datos SQL distribuida. Se identific\u00f3 una vulnerabilidad de alto riesgo en versiones anteriores a la 5.7.2 donde el endpoint TLS (puerto 4200) permite la renegociaci\u00f3n iniciada por el cliente. En este escenario, un atacante puede aprovechar esta caracter\u00edstica para solicitar repetidamente la renegociaci\u00f3n de los par\u00e1metros de seguridad durante una sesi\u00f3n TLS en curso. Esta falla podr\u00eda provocar un consumo excesivo de recursos de la CPU, lo que provocar\u00eda una posible sobrecarga del servidor e interrupci\u00f3n del servicio. La vulnerabilidad se confirm\u00f3 utilizando un cliente openssl donde el comando \\\"R\\\" inicia la renegociaci\u00f3n, seguido por el servidor que confirma con \\\"RENEGOTIATING\\\". Esta vulnerabilidad permite a un atacante realizar un ataque de denegaci\u00f3n de servicio agotando los recursos de la CPU del servidor mediante repetidas renegociaciones de TLS. Esto afecta la disponibilidad de los servicios que se ejecutan en el servidor afectado, lo que representa un riesgo significativo para la estabilidad operativa y la seguridad. TLS 1.3 proh\u00edbe expl\u00edcitamente la renegociaci\u00f3n, ya que cierra una ventana de oportunidad para un ataque. La versi\u00f3n 5.7.2 de CrateDB contiene la soluci\u00f3n al problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"references\":[{\"url\":\"https://cratedb.com/docs/crate/reference/en/latest/appendices/release-notes/5.7.2.html\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/crate/crate/commit/1dde03bdf031a20886065195527e368e4a3218b3\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://cratedb.com/docs/crate/reference/en/latest/appendices/release-notes/5.7.2.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/crate/crate/commit/1dde03bdf031a20886065195527e368e4a3218b3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-37309\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-12T19:17:22.486657Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:cratedb:cratedb:*:*:*:*:*:*:*:*\"], \"vendor\": \"cratedb\", \"product\": \"cratedb\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"5.7.2\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-12T19:19:34.884Z\"}}], \"cna\": {\"title\": \"Client initialized Session-Renegotiation DoS\", \"source\": {\"advisory\": \"GHSA-x268-qpg6-w9g2\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"crate\", \"product\": \"crate\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 5.7.2\"}]}], \"references\": [{\"url\": \"https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2\", \"name\": \"https://github.com/crate/crate/security/advisories/GHSA-x268-qpg6-w9g2\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/crate/crate/commit/1dde03bdf031a20886065195527e368e4a3218b3\", \"name\": \"https://github.com/crate/crate/commit/1dde03bdf031a20886065195527e368e4a3218b3\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://cratedb.com/docs/crate/reference/en/latest/appendices/release-notes/5.7.2.html\", \"name\": \"https://cratedb.com/docs/crate/reference/en/latest/appendices/release-notes/5.7.2.html\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"CrateDB is a distributed SQL database. A high-risk vulnerability has been identified in versions prior to 5.7.2 where the TLS endpoint (port 4200) permits client-initiated renegotiation. In this scenario, an attacker can exploit this feature to repeatedly request renegotiation of security parameters during an ongoing TLS session. This flaw could lead to excessive consumption of CPU resources, resulting in potential server overload and service disruption. The vulnerability was confirmed using an openssl client where the command `R` initiates renegotiation, followed by the server confirming with `RENEGOTIATING`. This vulnerability allows an attacker to perform a denial of service attack by exhausting server CPU resources through repeated TLS renegotiations. This impacts the availability of services running on the affected server, posing a significant risk to operational stability and security. TLS 1.3 explicitly forbids renegotiation, since it closes a window of opportunity for an attack. Version 5.7.2 of CrateDB contains the fix for the issue.\\n\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-770\", \"description\": \"CWE-770: Allocation of Resources Without Limits or Throttling\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-06-13T13:59:05.807Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-37309\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-07-12T19:19:58.771Z\", \"dateReserved\": \"2024-06-05T20:10:46.498Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-06-13T13:59:05.807Z\", \"assignerShortName\": \"GitHub_M\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.