7.5
CVE-2025-8671
- EPSS 0.08%
- Veröffentlicht 13.08.2025 12:03:37
- Zuletzt bearbeitet 17.08.2025 15:15:25
- Quelle cret@cert.org
- Teams Watchlist Login
- Unerledigt Login
A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerSUSE Linux
≫
Produkt
Enterprise Module for Development Tools
Version <
15-SP5
Version
15 SP2
Status
affected
HerstellerSUSE Linux
≫
Produkt
Enterprise High Performance Computing (HPC)
Version <
15 SP5
Version
15
Status
affected
HerstellerVarnish Software
≫
Produkt
Varnish Enterprise
Version <=
6.0.14r4
Version
6.0.x
Status
affected
HerstellerVarnish Software
≫
Produkt
Varnish Cache
Version <=
6.014
Version
6.0LTS
Status
affected
HerstellerVarnish Software
≫
Produkt
Varnish Cache
Version <=
7.71
Version
5.x
Status
affected
HerstellerFastly
≫
Produkt
H20
Version
579ecfa
Status
affected
HerstellerWind River
≫
Produkt
Linux
Version <=
TLS25
Version
LTS22
Status
affected
HerstellerSUSE Linux
≫
Produkt
Enterprise Desktop
Version <
15 SP7
Version
15 SP6
Status
affected
HerstellerSUSE Linux
≫
Produkt
Enterprise High Performance Computing
Version <
15 SP7
Version
15 SP3
Status
affected
HerstellerSUSE Linux
≫
Produkt
Enterprise Module for Dev Tools
Version <
15 SP7
Version
15 SP3
Status
affected
HerstellerSUSE Linux
≫
Produkt
Enterprise Module for Package Hub
Version <
15 SP7
Version
15 SP5
Status
affected
HerstellerSUSE Linux
≫
Produkt
Enterprise Server
Version <
15 SP7
Version
12 SP5
Status
affected
HerstellerSUSE Linux
≫
Produkt
Enterprise Server for SAP Applications
Version <
15 SP7
Version
15 SP6
Status
affected
HerstellerSUSE Linux
≫
Produkt
SUSE Manager Server
Version
4.3
Status
affected
HerstellerSUSE Linux
≫
Produkt
SUSE Manager Server LTS
Version
4.3
Status
affected
HerstellerSUSE Linux
≫
Produkt
SUSE Manager Proxy
Version
4.3
Status
affected
HerstellerSUSE Linux
≫
Produkt
SUSE Manager Retail Branch Server
Version
4.3
Status
affected
HerstellerSUSE Linux
≫
Produkt
openSUSE Leap
Version
15.6
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.08% | 0.253 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-404 Improper Resource Shutdown or Release
The product does not release or incorrectly releases a resource before it is made available for re-use.