QID 92067
Date Published: 2023-10-11
QID 92067: Microsoft HTTP/2 Protocol Distributed Denial of Service (DoS) Vulnerability
CVE-2023-44487: The HTTP/2 protocol is vulnerable to Distributed Denial of Service (DDoS) attack also known as 'HTTP/2 Rapid Reset' attack. This allows malicious actors to launch a DDoS attack targeting HTTP/2 servers.
Affected Products:
Windows Server 2019
Windows Server 2016
Windows Server 2022
Windows 11 Version 21H2
Windows 11 Version 22H2
Windows 10 Version 21H2
Windows 10 Version 22H2
Windows 10 Version 1607
Microsoft Windows 10 Version 1809
.NET 7.0 and 6.0
ASP.NET Core 7.0 and 6.0
Microsoft Visual Studio 2022 version 17.2
Microsoft Visual Studio 2022 version 17.4
Microsoft Visual Studio 2022 version 17.6
Microsoft Visual Studio 2022 version 17.7
QID Detection Logic:
Windows: This QID checks for the file version of 'http.sys'.
.Net:
On Windows, this QID detects vulnerable versions of Microsoft .NET by checking the file version.
On Linux, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" and "/root/shared/Microsoft.NETCore.App" folders.
On Mac, this QID detects vulnerable versions of Microsoft .NET by checking the .NET version present in "/usr/share/dotnet/shared/Microsoft.NETCore.App/" folder.
Asp.Net: The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.
Visual Studio: This QID detects vulnerable versions of Microsoft Visual Studio by checking the registry key "HKLM\SOFTWARE\Microsoft" and file "evenv.exe" to check the version of the Visual Studio.
Successful exploitation of this vulnerability may allow an attacker targeting HTTP/2 servers to consume server resource significantly leads to denial of service.
Workaround:
Microsoft strongly recommends that you install the updates for this vulnerability as soon as possible even if you plan to leave either of these workarounds in place:
1. Disable the HTTP/2 protocol on your web server by using the Registry Editor
2. Include a protocols setting for each Kestral endpoint to limit your application to HTTP1.1
- Microsoft Security Advisory -
msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487
CVEs related to QID 92067
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Microsoft Security Advisory |
|