Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown

CVE-2023-44487

Disclosure Date: October 10, 2023 (last updated June 28, 2024)
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Attacker Value
Unknown

CVE-2021-24029

Disclosure Date: March 15, 2021 (last updated November 28, 2024)
A packet of death scenario is possible in mvfst via a specially crafted message during a QUIC session, which causes a crash via a failed assertion. Per QUIC specification, this particular message should be treated as a connection error. This issue affects mvfst versions prior to commit a67083ff4b8dcbb7ee2839da6338032030d712b0 and proxygen versions prior to v2021.03.15.00.
Attacker Value
Unknown

CVE-2020-1897

Disclosure Date: May 18, 2020 (last updated November 27, 2024)
A use-after-free is possible due to an error in lifetime management in the request adaptor when a malicious client invokes request error handling in a specific sequence. This issue affects versions of proxygen prior to v2020.05.18.00.
Attacker Value
Unknown

CVE-2019-11940

Disclosure Date: August 14, 2019 (last updated November 27, 2024)
In the course of decompressing HPACK inside the HTTP2 protocol, an unexpected sequence of header table resize operations can place the header table into a corrupted state, leading to a use-after-free condition and undefined behavior. This issue affects Proxygen from v0.29.0 until v2017.04.03.00.
Attacker Value
Unknown

CVE-2019-11921

Disclosure Date: July 25, 2019 (last updated November 27, 2024)
An out of bounds write is possible via a specially crafted packet in certain configurations of Proxygen due to improper handling of Base64 when parsing malformed binary content in Structured HTTP Headers. This issue affects versions of proxygen prior to v2019.07.22.00.
0
Attacker Value
Unknown

CVE-2018-6346

Disclosure Date: December 31, 2018 (last updated November 27, 2024)
A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 priority settings (specifically a circular dependency). This affects Proxygen prior to v2018.12.31.00.
0
Attacker Value
Unknown

CVE-2018-6347

Disclosure Date: December 31, 2018 (last updated November 27, 2024)
An issue in the Proxygen handling of HTTP2 parsing of headers/trailers can lead to a denial-of-service attack. This affects Proxygen prior to v2018.12.31.00.
0
Attacker Value
Unknown

CVE-2018-6343

Disclosure Date: December 31, 2018 (last updated November 27, 2024)
Proxygen fails to validate that a secondary auth manager is set before dereferencing it. That can cause a denial of service issue when parsing a Certificate/CertificateRequest HTTP2 Frame over a fizz (TLS 1.3) transport. This issue affects Proxygen releases starting from v2018.10.29.00 until the fix in v2018.11.19.00.
0
Attacker Value
Unknown

CVE-2015-7264

Disclosure Date: April 10, 2017 (last updated November 08, 2023)
The SPDY/2 codec in Facebook Proxygen before 2015-11-09 truncates a certain field to two bytes, which allows hijacking and injection attacks.
0
Attacker Value
Unknown

CVE-2015-7265

Disclosure Date: April 10, 2017 (last updated November 08, 2023)
Facebook Proxygen before 2015-11-09 mismanages HTTPMessage.request state, which allows remote attackers to conduct hijacking attacks and bypass ACL checks.
0