CVE-2024-2653: CWE-789: Memory Allocation with Excessive Size Value in AMPHP amphp/http-client
amphp/http will collect CONTINUATION frames in an unbounded buffer and will not check a limit until it has received the set END_HEADERS flag, resulting in an OOM crash.
AI Analysis
Technical Summary
CVE-2024-2653 is a vulnerability classified under CWE-789 (Memory Allocation with Excessive Size Value) affecting the AMPHP amphp/http-client library, specifically version 4.0.0-rc10. The issue arises from the way the library handles HTTP/2 CONTINUATION frames: it collects these frames in an unbounded buffer without enforcing any size limit until the END_HEADERS flag is received. This design flaw allows an attacker to send a sequence of CONTINUATION frames that cause the client to allocate an excessively large amount of memory. The result is an out-of-memory (OOM) condition that crashes the application, leading to denial of service (DoS). The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as it leverages the HTTP/2 protocol framing. The CVSS v3.1 score of 8.2 reflects the high impact on availability and the ease of exploitation. While no public exploits have been reported yet, the vulnerability poses a significant risk to services relying on this library for HTTP client functionality, especially those handling HTTP/2 traffic. The absence of patch links suggests that a fix may still be pending, emphasizing the need for immediate mitigation measures. This vulnerability could be exploited by attackers to disrupt web services, degrade user experience, or cause cascading failures in dependent systems.
Potential Impact
For European organizations, the primary impact of CVE-2024-2653 is on service availability. Applications and services using the vulnerable amphp/http-client library for HTTP/2 communications may crash due to OOM conditions triggered by maliciously crafted HTTP/2 CONTINUATION frames. This can lead to denial of service, affecting business continuity, customer trust, and potentially causing financial losses. Organizations in sectors such as finance, e-commerce, and public services that rely on asynchronous PHP frameworks and HTTP/2 for performance and scalability are particularly at risk. Additionally, the disruption could be exploited as part of a larger attack chain to weaken defenses or distract security teams. Given the remote exploitability without authentication, attackers can target exposed services directly, increasing the threat surface. The lack of known exploits currently provides a window for proactive defense, but the high CVSS score indicates that exploitation could have severe consequences if weaponized.
Mitigation Recommendations
1. Monitor vendor channels closely for official patches or updates addressing CVE-2024-2653 and apply them promptly once available. 2. In the interim, implement strict HTTP/2 frame size limits at the network perimeter or via reverse proxies to prevent excessive CONTINUATION frame sequences from reaching vulnerable clients. 3. Employ runtime memory usage monitoring and alerting on services using amphp/http-client to detect abnormal memory consumption patterns indicative of exploitation attempts. 4. Consider deploying Web Application Firewalls (WAFs) or HTTP/2-aware intrusion prevention systems that can detect and block malformed or suspicious HTTP/2 frames. 5. Review and restrict exposure of services using the vulnerable library to untrusted networks where possible, reducing the attack surface. 6. Conduct code audits and testing for similar unbounded buffer issues in other components to prevent analogous vulnerabilities. 7. Educate development teams on secure handling of protocol frames and memory management best practices to avoid future CWE-789 issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2024-2653: CWE-789: Memory Allocation with Excessive Size Value in AMPHP amphp/http-client
Description
amphp/http will collect CONTINUATION frames in an unbounded buffer and will not check a limit until it has received the set END_HEADERS flag, resulting in an OOM crash.
AI-Powered Analysis
Technical Analysis
CVE-2024-2653 is a vulnerability classified under CWE-789 (Memory Allocation with Excessive Size Value) affecting the AMPHP amphp/http-client library, specifically version 4.0.0-rc10. The issue arises from the way the library handles HTTP/2 CONTINUATION frames: it collects these frames in an unbounded buffer without enforcing any size limit until the END_HEADERS flag is received. This design flaw allows an attacker to send a sequence of CONTINUATION frames that cause the client to allocate an excessively large amount of memory. The result is an out-of-memory (OOM) condition that crashes the application, leading to denial of service (DoS). The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as it leverages the HTTP/2 protocol framing. The CVSS v3.1 score of 8.2 reflects the high impact on availability and the ease of exploitation. While no public exploits have been reported yet, the vulnerability poses a significant risk to services relying on this library for HTTP client functionality, especially those handling HTTP/2 traffic. The absence of patch links suggests that a fix may still be pending, emphasizing the need for immediate mitigation measures. This vulnerability could be exploited by attackers to disrupt web services, degrade user experience, or cause cascading failures in dependent systems.
Potential Impact
For European organizations, the primary impact of CVE-2024-2653 is on service availability. Applications and services using the vulnerable amphp/http-client library for HTTP/2 communications may crash due to OOM conditions triggered by maliciously crafted HTTP/2 CONTINUATION frames. This can lead to denial of service, affecting business continuity, customer trust, and potentially causing financial losses. Organizations in sectors such as finance, e-commerce, and public services that rely on asynchronous PHP frameworks and HTTP/2 for performance and scalability are particularly at risk. Additionally, the disruption could be exploited as part of a larger attack chain to weaken defenses or distract security teams. Given the remote exploitability without authentication, attackers can target exposed services directly, increasing the threat surface. The lack of known exploits currently provides a window for proactive defense, but the high CVSS score indicates that exploitation could have severe consequences if weaponized.
Mitigation Recommendations
1. Monitor vendor channels closely for official patches or updates addressing CVE-2024-2653 and apply them promptly once available. 2. In the interim, implement strict HTTP/2 frame size limits at the network perimeter or via reverse proxies to prevent excessive CONTINUATION frame sequences from reaching vulnerable clients. 3. Employ runtime memory usage monitoring and alerting on services using amphp/http-client to detect abnormal memory consumption patterns indicative of exploitation attempts. 4. Consider deploying Web Application Firewalls (WAFs) or HTTP/2-aware intrusion prevention systems that can detect and block malformed or suspicious HTTP/2 frames. 5. Review and restrict exposure of services using the vulnerable library to untrusted networks where possible, reducing the attack surface. 6. Conduct code audits and testing for similar unbounded buffer issues in other components to prevent analogous vulnerabilities. 7. Educate development teams on secure handling of protocol frames and memory management best practices to avoid future CWE-789 issues.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- certcc
- Date Reserved
- 2024-03-19T15:20:53.090Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a47636d939959c8022fde
Added to database: 11/4/2025, 6:35:15 PM
Last enriched: 11/4/2025, 6:45:04 PM
Last updated: 11/5/2025, 3:20:35 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-52602: CWE-359: Exposure of Private Personal Information to an Unauthorized Actor in HCL Software BigFix Query
MediumCVE-2025-3125: CWE-434 Unrestricted Upload of File with Dangerous Type in WSO2 WSO2 Identity Server
MediumCVE-2025-47151: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Entr'ouvert Lasso
CriticalCVE-2025-46784: CWE-401: Improper Release of Memory Before Removing Last Reference in Entr'ouvert Lasso
CriticalCVE-2025-46705: CWE-617: Reachable Assertion in Entr'ouvert Lasso
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.