Описание
A HTTP/2 implementation built using any version of the Python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree.
Ссылки
- Third Party AdvisoryVDB Entry
- MitigationVendor Advisory
- Third Party AdvisoryVDB Entry
- MitigationVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:python:python_priority_library:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python_priority_library:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python_priority_library:1.1.1:*:*:*:*:*:*:*
EPSS
Процентиль: 64%
0.00476
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-399
Связанные уязвимости
CVSS3: 7.5
fstec
около 9 лет назад
Уязвимость библиотеки python priority library, связанная с ошибками управления ресурсами, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
Процентиль: 64%
0.00476
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-399