Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-9514

Опубликовано: 13 авг. 2019
Источник: debian
EPSS Низкий

Описание

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-1.13fixed1.13~beta1-3package
golang-1.12fixed1.12.8-1package
golang-1.11fixed1.11.13-1package
golang-1.8removedpackage
golang-1.8ignoredstretchpackage
golang-1.7removedpackage
golang-1.7ignoredstretchpackage
golangremovedpackage
golangnot-affectedjessiepackage
golang-golang-x-net-devfixed1:0.0+git20190811.74dc4d7+dfsg-1package
golang-golang-x-net-devno-dsabusterpackage
nodejsfixed10.16.3~dfsg-1package
nodejsnot-affectedstretchpackage
nodejsnot-affectedjessiepackage
trafficserverfixed8.0.5+ds-1package
h2ofixed2.2.5+dfsg2-3package
rust-h2fixed0.3.24-1package
rust-h2no-dsabookwormpackage
rust-h2no-dsabusterpackage

Примечания

  • Issue: https://github.com/golang/go/issues/33606

  • https://github.com/golang/go/commit/e152b01a468a1c18a290bf9aec52ccea7693c7f2 (golang-1.11)

  • https://github.com/golang/go/commit/7139b45d1410ded14e1e131151fd8dfc435ede6c (golang-1.12)

  • https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md

  • https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/

  • https://raw.githubusercontent.com/apache/trafficserver/8.0.x/CHANGELOG-8.0.4

  • https://github.com/h2o/h2o/issues/2090

  • https://github.com/h2o/h2o/commit/743d6b6118c29b75d0b84ef7950a2721c32dfe3f

  • https://rustsec.org/advisories/RUSTSEC-2024-0003.html

  • https://github.com/hyperium/h2/pull/737

EPSS

Процентиль: 92%
0.08585
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
redhat
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
nvd
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
msrc
почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
github
около 3 лет назад

golang.org/x/net/http vulnerable to a reset flood

EPSS

Процентиль: 92%
0.08585
Низкий
Уязвимость CVE-2019-9514