www.rivitmedia.comwww.rivitmedia.comwww.rivitmedia.com
  • Home
  • Tech News
    Tech NewsShow More
    Malicious Go Modules Unleash Disk-Wiping Chaos in Linux Supply Chain Attack
    4 Min Read
    Agentic AI: Transforming Cybersecurity in 2025
    3 Min Read
    Cybersecurity CEO Accused of Planting Malware in Hospital Systems: A Breach of Trust That Shocks the Industry
    6 Min Read
    Cloud Convenience, Criminal Opportunity: How Google Sites Became a Launchpad for Elite Phishing
    6 Min Read
    Targeted Exploits Highlight Need for Vigilance Among High-Risk Apple Users
    4 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • FREE SCAN
  • Cybersecurity for Business
  • en English▼
    af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeilgeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 rivitMedia.com. All Rights Reserved.
Reading: New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks
Share
en English▼
af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeilgeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu
Notification Show More
Font ResizerAa
www.rivitmedia.comwww.rivitmedia.com
en English▼
af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeilgeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu
Font ResizerAa
  • Online Scams
  • Tech News
  • Cyber Threats
  • Mac Malware
  • Cybersecurity for Business
  • FREE SCAN
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    • Cybersecurity for Business
  • FREE SCAN
  • Sitemap
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
www.rivitmedia.com > Blog > Cyber Threats > Malware > New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks
Cyber ThreatsHow-To-GuidesIT/Cybersecurity Best PracticesMalwareTech News

New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks

riviTMedia Research
Last updated: April 5, 2024 5:10 pm
riviTMedia Research
Share
New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks
SHARE

In the ever-evolving landscape of cybersecurity, researchers continuously uncover vulnerabilities that threaten the stability and security of digital infrastructures. The latest discovery by security expert Bartek Nowotarski sheds light on a critical flaw in the widely used HTTP/2 protocol, presenting a significant risk to web servers worldwide. Dubbed the CONTINUATION Flood, this exploit enables attackers to launch denial-of-service (DoS) attacks, potentially causing server crashes or severe performance degradation.

Contents
Understanding the CONTINUATION Flood VulnerabilityAffected Implementations and Exploitation ScenariosMitigation Strategies and Best PracticesRemoval Guide

Understanding the CONTINUATION Flood Vulnerability

At the heart of this vulnerability lies a flaw in how HTTP/2 implementations handle CONTINUATION frames within a single stream. Unlike its predecessor HTTP/1, which transmitted headers in a single block, HTTP/2 divides headers into fragments encapsulated within CONTINUATION frames. While this approach offers performance benefits, it also introduces a vulnerability that can be exploited by malicious actors.

Attackers leverage this vulnerability by inundating a server with a continuous stream of CONTINUATION frames, deliberately omitting the END_HEADERS flag. This malicious action forces the server to parse and store an excessive amount of header data in memory, leading to memory exhaustion or crashes. What makes this threat particularly insidious is its ability to disrupt server availability using a single machine or TCP connection, with the attack often remaining undetected in HTTP access logs.

Affected Implementations and Exploitation Scenarios

Numerous HTTP/2 implementations are susceptible to the CONTINUATION Flood exploit, including widely used projects such as Apache HTTP Server, Node.js, and Golang. Attackers can exploit vulnerabilities in these implementations to orchestrate DoS attacks, exploiting weaknesses in how each system handles CONTINUATION frames.

For instance, in the case of Node.js, attackers can render the HTTP/2 server unavailable by sending a limited number of HTTP/2 frame packets containing a few frames, triggering a race condition that leads to memory leaks. Similarly, Envoy’s oghttp codec fails to reset requests when header map limits are exceeded, enabling attackers to trigger unlimited memory consumption.

Mitigation Strategies and Best Practices

As the threat landscape evolves, it’s imperative for organizations to implement robust mitigation strategies to protect against emerging threats like the CONTINUATION Flood exploit. Here are some recommended steps:

  1. Patch and Update: Ensure that affected software, including web servers and HTTP/2 implementations, are promptly updated to the latest versions that address the vulnerability. This is the most effective way to mitigate the risk of exploitation.
  2. Temporary Disabling of HTTP/2: If a patch is unavailable, consider temporarily disabling HTTP/2 support on web servers to mitigate the risk of exploitation. While this may impact performance, it provides a necessary layer of protection until a permanent solution is implemented.
  3. Network Monitoring and Anomaly Detection: Implement robust network monitoring solutions capable of detecting anomalous patterns indicative of a DoS attack, such as a sudden influx of CONTINUATION frames. Early detection enables swift response and mitigation.
  4. Resource Limiting: Configure web servers to enforce resource limits, such as maximum header size or connection thresholds, to mitigate the impact of potential DoS attacks.
  5. Regular Security Audits: Conduct regular security audits of web servers and HTTP/2 implementations to identify and address potential vulnerabilities proactively.

Removal Guide

If your server has been compromised by a CONTINUATION Flood attack, follow these steps to remove the threat:

  1. Isolate Affected Systems: Immediately disconnect the compromised server from the network to prevent further spread of the attack.
  2. Terminate Suspicious Processes: Identify and terminate any suspicious processes associated with the attack using system monitoring tools.
  3. Restore from Backup: If feasible, restore the affected server from a clean backup to ensure the removal of any malicious code or artifacts.
  4. Implement Security Updates: Once the server is restored, apply any necessary security updates and patches to address the vulnerability exploited by the attack.
  5. Monitor for Recurrence: Continuously monitor server logs and network traffic for signs of recurrence or additional malicious activity.

By taking proactive measures to address vulnerabilities and implement robust security practices, organizations can safeguard their web servers against emerging threats like the CONTINUATION Flood exploit. Stay vigilant, stay updated, and prioritize cybersecurity to mitigate the risk of DoS attacks and protect critical digital assets.

You Might Also Like

Searchresultsquickly.com – Yet Another Phony Search Engine Disrupting your Browsing Experience
Fake Valorant Gift Scam: A Malicious Cyber Threat
TFBank Email Scam: Detection, Removal, and Prevention Guide
What are the Dangers of Flvto YouTube Downloader and how to Remove it?
Commercial Invoice Email Scam: A Comprehensive Guide
TAGGED:DDosHTTP2MalwareSoftware Vulnerabilities

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

Your Details

Let us know how to get back to you.

Example: user@website.com
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article 777 (GlobeImposter) Ransomware: A Menace to Digital Security
Next Article Getvstcenter.com: A Browser Hijacker’s Tactics and Removal Guide
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Free

✅ Free Scan Available 

✅ 13M Scans/Month

✅ Instant Detection

Download SpyHunter

//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Your Details

Let us know how to get back to you.

Example: user@website.com
© 2023 • rivitmedia.com All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US