Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Newly Identified HTTP/2 CONTINUATION Flood Vulnerability Threatens Server Stability
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Newly Identified HTTP/2 CONTINUATION Flood Vulnerability Threatens Server Stability

Highlights

  • Security researcher exposes new HTTP/2 vulnerability.

  • Attack allows single machine to severely disrupt servers.

  • Cybersecurity community called to action for defense measures.

Kaan Demirel
Last updated: 4 April, 2024 - 7:20 pm 7:20 pm
Kaan Demirel 1 year ago
Share
SHARE

In a startling revelation, security researcher Bartek Nowotarski has brought to light a new vulnerability within the HTTP/2 protocol, known as the HTTP/2 CONTINUATION Flood. This vulnerability demonstrates the potential to cause more considerable harm than previously encountered attacks such as the Rapid Reset attack, by severely disrupting server operations. The attack mechanism is such that it can be executed with limited resources, making the threat even more significant as even a single machine could use it to induce server crashes or serious performance downgrades.

Contents
The Attack’s MechanicsUnderstanding the ImplicationsUseful Information for the Reader

The digital landscape has been rife with security challenges, and the HTTP/2 protocol has been at the center of many discussions. While HTTP/2 was developed to improve upon the limitations of its predecessor, HTTP/1.1, by allowing more efficient and faster communication between web servers and clients, it has also introduced new attack vectors. Previously, researchers had identified security concerns with the protocol, but the CONTINUATION Flood represents a more considerable threat due to its stealthy nature and the minimal effort required to launch an attack.

The Attack’s Mechanics

HTTP/2’s CONTINUATION frames feature is the focal point of the vulnerability. By initiating a stream of HEADERS and CONTINUATION frames without setting the END_HEADERS flag, an attacker can force the server to continuously parse and store these incomplete headers, draining memory resources. This is unlike HTTP/1.1, which has defenses against such infinite header attacks. Compounding the issue, the attack is covert and leaves no trace in HTTP access logs, allowing it to go undetected by traditional monitoring systems.

Understanding the Implications

The simplicity and minimal resource requirements for the CONTINUATION Flood attack raise serious concerns regarding the security of services dependent on HTTP/2. With the ability to cripple servers using negligible amounts of data and evade detection, the vulnerability has sparked a concerted effort within the cybersecurity community to develop countermeasures. The push for updated server configurations, patches, and advanced monitoring tools to detect such attacks has become more urgent.

Additional insight on this topic comes from related articles. A piece from The Hacker News, titled “Critical HTTP/2 Implementation Vulnerabilities Expose Servers to DoS Attacks,” further explores the vulnerabilities inherent in HTTP/2 implementations. Moreover, an article from SecurityWeek, “HTTP/2: In-depth Analysis of the Top Four Flaws of the Next Generation Web Protocol,” provides a comprehensive breakdown of HTTP/2’s common vulnerabilities and their possible implications. These articles underscore the ongoing concern over HTTP/2 security and the need for constant vigilance in the face of new threats.

Useful Information for the Reader

  • CONTINUATION Flood exploits HTTP/2’s CONTINUATION frame feature.
  • Attack can be conducted stealthily without traces in access logs.
  • Enhanced server monitoring tools are vital for early detection.

The discovery of the HTTP/2 CONTINUATION Flood vulnerability underscores the imperative for ongoing security vigilance. As cyber threats evolve, so must the defenses against them. This situation emphasizes the need for administrators to update their server software and for developers to correct protocol implementations. It also highlights the critical role of sophisticated monitoring tools capable of detecting even the most surreptitious attacks. For the vast ecosystem of online services that rely on HTTP/2, this vulnerability is a call to strengthen their cyber resilience.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Trump Urges Colorado to Release Jailed Clerk Over Election Breach

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Google Bolsters Chrome Security Following Pwn2Own Zero-Day Exploits
Next Article MSI Motherboards Plagued by Chip Defect Leading to Failure

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

ABB Advances AMR Technology with vSLAM for Enhanced Operations
Robotics
Tesla Semi Gains Momentum with US Foods Collaboration
Electric Vehicle
AMD’s New Graphics Card Threatens Nvidia’s Market Share
Computing
Dodge Charger Hits Tesla Cybertruck in Failed Stunt
Electric Vehicle
Sonair Unveils ADAR Sensor to Enhance Robot Safety
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?