CVE-2024-45311: Denial of service in quinn-proto when using `Endpoint::retry()`
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.34359%
CWE
Published
9/3/2024
Updated
9/9/2024
KEV Status
No
Technology
Rust
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| quinn-proto | rust | >= 0.11.0, < 0.11.7 | 0.11.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper CID handling in connection state management. Key issues were:
- clean_up_incoming used orig_dst_cid instead of current packet's dst_cid
- remove_initial didn't validate CID length or existence
- The retry path combined these issues by creating state mismatches Commit changes show fixes to use packet.header.dst_cid, add CID length checks, and insert debug assertions - confirming these were the vulnerable points.