Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-9512

Опубликовано: 13 авг. 2019
Источник: redhat
CVSS3: 7.5
EPSS Средний

Описание

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.

Отчет

The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019. This issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2. The following storage product versions are affected because they include the support for HTTP/2 in:

  • golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3
  • heketi(embeds golang) as shipped with Red Hat Gluster Storage 3
  • grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3 This flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections. The nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code. All OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5nginxNot affected
OpenShift Service Mesh Tech PreviewmaistraNot affected
Red Hat AMQ Broker 7nettyAffected
Red Hat Ansible Tower 3nginxNot affected
Red Hat Ceph Storage 2golangAffected
Red Hat Ceph Storage 2grafanaNot affected
Red Hat Ceph Storage 3golangAffected
Red Hat Ceph Storage 3grafanaAffected
Red Hat Enterprise Linux 7golangNot affected
Red Hat Enterprise Linux 8nginx:1.14/nginxNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1735645HTTP/2: flood using PING frames results in unbounded memory growth

EPSS

Процентиль: 95%
0.21241
Средний

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
nvd
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
msrc
почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
debian
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to ping floods, potentially ...

CVSS3: 7.5
github
около 3 лет назад

golang.org/x/net/http vulnerable to ping floods

EPSS

Процентиль: 95%
0.21241
Средний

7.5 High

CVSS3

Уязвимость CVE-2019-9512