Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-9513

Опубликовано: 13 авг. 2019
Источник: debian
EPSS Низкий

Описание

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nginxfixed1.14.2-3package
nginxnot-affectedjessiepackage
nodejsfixed10.16.3~dfsg-1package
nodejsnot-affectedstretchpackage
nodejsnot-affectedjessiepackage
nghttp2fixed1.39.2-1package
nghttp2not-affectedjessiepackage

Примечания

  • https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/

  • https://github.com/nginx/nginx/commit/5ae726912654da10a9a81b2c8436829f3e94f69f (master)

  • https://github.com/nginx/nginx/commit/39bb3b9d4a33bd03c8ae0134dedc8a7700ae7b2b (release-1.16.1)

  • https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md

  • https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/

  • https://github.com/nghttp2/nghttp2/releases/tag/v1.39.2

EPSS

Процентиль: 88%
0.04357
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
redhat
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
nvd
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
msrc
почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
github
около 3 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

EPSS

Процентиль: 88%
0.04357
Низкий