CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-31309: Apache Traffic Server: HTTP/2 CONTINUATION frames can be utilized for DoS attack

Description

HTTP/2 CONTINUATION DoS attack can cause Apache Traffic Server to consume more resources on the server.  Version from 8.0.0 through 8.1.9, from 9.0.0 through 9.2.3 are affected.

Users can set a new setting (proxy.config.http2.max_continuation_frames_per_minute) to limit the number of CONTINUATION frames per minute.  ATS does have a fixed amount of memory a request can use and ATS adheres to these limits in previous releases.
Users are recommended to upgrade to versions 8.1.10 or 9.2.4 which fixes the issue.

Classification

CVE ID: CVE-2024-31309

Affected Products

Vendor: Apache Software Foundation

Product: Apache Traffic Server

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 16.94% (scored less or equal to compared to others)

EPSS Date: 2025-03-14 (when was this score calculated)

References

https://lists.apache.org/thread/f9qh3g3jvy153wh82pz4onrfj1wh13kc
https://lists.fedoraproject.org/archives/list/[email protected]/message/QV77HYM7ARSTL3B6U3IFG7PHDU65WL4I/
https://lists.fedoraproject.org/archives/list/[email protected]/message/T3XON6RM5ZKCZ6K6NB7BOTAWMJQKXJDO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PBKLPQ6ECG4PGEPRCYI3Y3OITNDEFCCV/
https://lists.debian.org/debian-lts-announce/2024/04/msg00021.html
http://www.openwall.com/lists/oss-security/2024/04/03/16
http://www.openwall.com/lists/oss-security/2024/04/10/7

Timeline