Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-9516

Опубликовано: 13 авг. 2019
Источник: debian
EPSS Низкий

Описание

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nginxfixed1.14.2-3package
nginxnot-affectedjessiepackage

Примечания

  • https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/

  • https://github.com/nginx/nginx/commit/6dfbc8b1c2116f362bb871efebbf9df576738e89 (master)

  • https://github.com/nginx/nginx/commit/dbdd9ffea81d9db46fb88b5eba828f2ad080d388 (release-1.16.1)

  • https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md

EPSS

Процентиль: 84%
0.02211
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
redhat
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
nvd
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 6.5
github
около 3 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

EPSS

Процентиль: 84%
0.02211
Низкий