Vulnerability Description
quic-go through 0.27.0 allows remote attackers to cause a denial of service (CPU consumption) via a Slowloris variant in which incomplete QUIC or HTTP/3 requests are sent. This occurs because mtu_discoverer.go misparses the MTU Discovery service and consequently overflows the probe timer. NOTE: the vendor's position is that this behavior should not be listed as a vulnerability on the CVE List
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Quic-Go Project | Quic-Go | <= 0.27.0 |
Related Weaknesses (CWE)
References
- https://github.com/lucas-clemente/quic-go/blob/84e03e59760ceee37359688871bb0688fExploitThird Party Advisory
- https://github.com/lucas-clemente/quic-go/blob/84e03e59760ceee37359688871bb0688fExploitThird Party Advisory
FAQ
What is CVE-2022-30591?
CVE-2022-30591 is a vulnerability with a CVSS score of 7.5 (HIGH). quic-go through 0.27.0 allows remote attackers to cause a denial of service (CPU consumption) via a Slowloris variant in which incomplete QUIC or HTTP/3 requests are sent. This occurs because mtu_disc...
How severe is CVE-2022-30591?
CVE-2022-30591 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-30591?
Check the references section above for vendor advisories and patch information. Affected products include: Quic-Go Project Quic-Go.