TLS Error Handling Flaw in Envoy Proxy by Envoy Proxy Developers
CVE-2024-32475

Currently unrated

Key Information:

Status
Vendor
CVE Published:
18 April 2024

What is CVE-2024-32475?

A vulnerability in Envoy Proxy occurs when using an upstream TLS cluster with 'auto_sni' enabled, where a request containing a 'host' or ':authority' header exceeding 255 characters leads to an abnormal termination of the Envoy process. This issue arises because the SNI (Server Name Indication) length is capped at 255 characters per standard, and Envoy fails to manage the error gracefully. The process aborts unexpectedly when it encounters this failure, which can disrupt service operations. The vulnerability has been addressed in versions 1.30.1, 1.29.4, 1.28.3, and 1.27.5.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

Timeline

  • Vulnerability published

.