Quicly is an IETF QUIC protocol implementation. Quicly up to commtit d720707 is susceptible to a denial-of-service attack. A remote attacker can exploit these bugs to trigger an assertion failure that crashes process using quicly. The vulnerability is addressed with commit 2a95896104901589c495bc41460262e64ffcad5c.
History

Tue, 12 Nov 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Dena
Dena quicly
CPEs cpe:2.3:a:dena:quicly:*:*:*:*:*:*:*:*
Vendors & Products Dena
Dena quicly

Tue, 15 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared H2o Project
H2o Project quicly
CPEs cpe:2.3:a:h20:quickly:*:*:*:*:*:*:*:* cpe:2.3:a:h2o_project:quicly:*:*:*:*:*:*:*:*
Vendors & Products H20
H20 quickly
H2o Project
H2o Project quicly

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared H20
H20 quickly
CPEs cpe:2.3:a:h20:quickly:*:*:*:*:*:*:*:*
Vendors & Products H20
H20 quickly
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 11 Oct 2024 14:45:00 +0000

Type Values Removed Values Added
Description Quicly is an IETF QUIC protocol implementation. Quicly up to commtit d720707 is susceptible to a denial-of-service attack. A remote attacker can exploit these bugs to trigger an assertion failure that crashes process using quicly. The vulnerability is addressed with commit 2a95896104901589c495bc41460262e64ffcad5c.
Title Quicly assertion failures
Weaknesses CWE-617
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-10-11T14:36:38.172Z

Updated: 2024-10-15T16:11:05.956Z

Reserved: 2024-08-28T20:21:32.802Z

Link: CVE-2024-45396

cve-icon Vulnrichment

Updated: 2024-10-11T15:01:16.988Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-11T15:15:04.457

Modified: 2024-11-12T20:05:09.367

Link: CVE-2024-45396

cve-icon Redhat

No data.