CVE-2024-3302

There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
CVSS

No CVSS.

Configurations

No configuration.

History

24 Apr 2024, 10:15

Type Values Removed Values Added
Summary (en) There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125 and Firefox ESR < 115.10. (en) There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox < 125, Firefox ESR < 115.10, and Thunderbird < 115.10.
References
  • () https://www.mozilla.org/security/advisories/mfsa2024-20/ -

22 Apr 2024, 10:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html -

19 Apr 2024, 11:15

Type Values Removed Values Added
Summary
  • (es) No había límite para la cantidad de frames de CONTINUATION HTTP/2 que se procesarían. Un servidor podría abusar de esto para crear una condición de falta de memoria en el navegador. Esta vulnerabilidad afecta a Firefox &lt; 125 y Firefox ESR &lt; 115.10.
References
  • () https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html -

16 Apr 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-16 16:15

Updated : 2024-04-24 10:15


NVD link : CVE-2024-3302

Mitre link : CVE-2024-3302

CVE.ORG link : CVE-2024-3302


JSON object : View

Products Affected

No product.

CWE

No CWE.