<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Apernet — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/apernet/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/apernet/feed.xml" rel="self" type="application/rss+xml"/><item><title>Hysteria Server Out-of-Memory Vulnerability via Malformed QUIC Packet</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-hysteria-quic-oom/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-hysteria-quic-oom/</guid><description>A specially constructed QUIC package can crash the Hysteria server due to an out-of-memory (OOM) condition when the 'sniff' option is enabled, leading to a denial of service.</description><content:encoded><![CDATA[<p>Hysteria is a feature-rich network utility optimized for networks experiencing high packet loss. A vulnerability exists in Hysteria versions 2.8.1 and earlier that can be exploited by a user with a valid password. When the &lsquo;sniff&rsquo; option is enabled on the Hysteria server, a malicious actor can send a specially crafted QUIC packet that triggers excessive memory allocation, leading to an out-of-memory (OOM) condition and subsequent denial of service. This attack vector allows a threat actor to exhaust server resources, disrupting legitimate network traffic and potentially impacting all users relying on the affected Hysteria server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker obtains a valid username and password for the Hysteria server.</li>
<li>The attacker connects to the Hysteria server using a Hysteria client.</li>
<li>The attacker establishes a UDP connection through the Hysteria client.</li>
<li>The attacker crafts a malicious QUIC packet designed to trigger excessive memory allocation. The packet contains a large crypto length field.</li>
<li>The attacker sends the malicious QUIC packet to the Hysteria server via the established UDP connection.</li>
<li>The Hysteria server receives the malicious QUIC packet and processes it due to the &lsquo;sniff&rsquo; option being enabled.</li>
<li>The server attempts to allocate memory based on the oversized crypto length specified in the malicious packet.</li>
<li>The server exhausts available memory, resulting in an out-of-memory (OOM) condition and a denial-of-service state.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service (DoS) condition on the Hysteria server. All users relying on the server for network connectivity will experience disruption. The vulnerability requires a valid username and password, limiting the scope of potential attackers, but the impact on availability is significant. This vulnerability affects any Hysteria server with the &lsquo;sniff&rsquo; option enabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Hysteria version 2.8.2 or later to patch the vulnerability.</li>
<li>Disable the <code>sniff</code> option in the Hysteria server configuration (<code>server.yaml</code>) if it is not essential for your deployment to prevent this attack.</li>
<li>Deploy the Sigma rule &ldquo;Detect Hysteria Malicious QUIC Packet&rdquo; to identify potential exploitation attempts by monitoring for unusually large packet sizes on UDP connections (see &lsquo;rules&rsquo; section).</li>
<li>Monitor server resource utilization, especially memory consumption, for anomalies that may indicate an ongoing attack.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>hysteria</category><category>quic</category><category>oom</category><category>dos</category></item></channel></rss>