Описание
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.
Ссылки
- PatchThird Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.12.4 (включая)
Одно из
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:1.13.2:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:1.14.2:*:*:*:*:*:*:*
EPSS
Процентиль: 63%
0.00437
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-401
Связанные уязвимости
CVSS3: 7.5
redhat
больше 5 лет назад
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.
CVSS3: 7.5
debian
больше 5 лет назад
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to incr ...
EPSS
Процентиль: 63%
0.00437
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-401