Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Error’d: Pickup Sticklers

      September 27, 2025

      From Prompt To Partner: Designing Your Custom AI Assistant

      September 27, 2025

      Microsoft unveils reimagined Marketplace for cloud solutions, AI apps, and more

      September 27, 2025

      Design Dialects: Breaking the Rules, Not the System

      September 27, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025

      Cailabs secures €57M to accelerate growth and industrial scale-up

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025
      Recent

      Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

      September 28, 2025

      Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

      September 28, 2025

      The first browser with JavaScript landed 30 years ago

      September 27, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured
      Recent
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»New HTTP/2 DoS Vulnerability Prompts Vendor and Project Fixes

    New HTTP/2 DoS Vulnerability Prompts Vendor and Project Fixes

    August 18, 2025

    MadeYouReset HTTP/2 DoS vulnerability

    A new HTTP/2 denial of service (DoS) vulnerability that circumvents mitigations put in place after 2023’s “Rapid Reset” vulnerability is largely being addressed by affected vendors and projects, thanks to responsible disclosure by the researchers who discovered the flaw.

    The new HTTP/2 DoS vulnerability, CVE-2025-8671, was publicly disclosed by Tel Aviv University researchers on Aug. 13, but the researchers have apparently been working with vendors since May to mitigate the flaw.

    According to a Cloudflare blog post, the vulnerability exists only “in a limited number of unpatched HTTP/2 server implementations that do not sufficiently enforce restrictions on the number of times a client may send malformed frames.”

    New HTTP/2 DoS Vulnerability Dubbed ‘MadeYouReset’

    Gal Bar Nahum, who discovered the flaw along with fellow Tel Aviv University researchers Anat Bremler‑Barr and Yaniv Harel, said in a blog post that the flaw “lets an attacker create effectively unbounded concurrent work on servers by bypassing HTTP/2’s built-in concurrency limit – causing a denial of service condition.”

    It builds on the flaw behind “Rapid Reset,” Nahum said, “with a neat twist that slips past the common mitigation.”

    2023’s Rapid Reset took advantage of HTTP/2’s request cancellation feature by opening streams and immediately canceling them using RST_STREAM so they didn’t count toward the MAX_CONCURRENT_STREAMS limit, which by default limits the number of active streams a client can have to 100.

    “The mitigation to Rapid Reset that was used by almost all affected implementations was very straightforward – limit the number of streams a client can cancel,” Nahum said.

    The researchers found a way around that limit by essentially making the server cancel the request instead of the client, an exploit they’ve dubbed “MadeYouReset.”

    “By crafting certain invalid control frames or violating protocol sequencing at just the right moment, we can make the server send RST_STREAM for a stream that already carried a valid request,” Nahum wrote.

    The researchers found six such primitives – which exploit WINDOW_UPDATE, PRIORITY, HEADERS and DATA frames – that were covered in a separate technical post.

    Vendors Respond to MadeYouReset HTTP/2 Vulnerability

    Cloudflare and Akamai said their implementations of HTTP/2 are not vulnerable to CVE-2025-8671, which is classified as an Improper Resource Shutdown or Release vulnerability (CWE-404).

    The Carnegie Mellon CERT Coordination Center listed a dozen vendors and projects that were affected by the flaw, some with differing CVEs, CWEs and severity ratings. Most of the affected vendors and projects appear to have issued fixes or mitigations, among them Apache Tomcat, F5, Fastly, h2o, Netty and IBM WebSphere Application Server Liberty.

    News of the MadeYouReset flaw also comes as PortSwigger released research detailing major security flaws in HTTP/1.1.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAI Pixel Art Generator – Transform photos to pixel art instantly
    Next Article Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures

    Related Posts

    Development

    Using phpinfo() to Debug Common and Not-so-Common PHP Errors and Warnings

    September 28, 2025
    Development

    Mastering PHP File Uploads: A Guide to php.ini Settings and Code Examples

    September 28, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Analyst View: Why platform engineering matters more than ever

    Tech & Work

    CISA Reveals ‘Pattern’ of Ransomware Attacks Against SimpleHelp RMM

    Security

    VidsHunt – Discover Latest Movies & TV Shows with Free Download Options

    Web Development

    Citrix Warns of Privilege Escalation Vulnerability in Windows Virtual Delivery Agent (CVE-2025-6759)

    Security

    Highlights

    OpenPGP.js Vulnerability Let Attackers Spoof Message Signature Verification

    June 12, 2025

    OpenPGP.js Vulnerability Let Attackers Spoof Message Signature Verification

    A critical vulnerability in the widely-used OpenPGP.js library has been discovered that allows attackers to forge digital signatures and deceive users into believing malicious content was legitimately …
    Read more

    Published Date:
    Jun 12, 2025 (3 hours, 25 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-47934

    Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns

    May 14, 2025

    Understanding box-sizing in CSS: A Better Way to Size Elements

    April 21, 2025

    Multimodal AI Needs More Than Modality Support: Researchers Propose General-Level and General-Bench to Evaluate True Synergy in Generalist Models

    May 12, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.