Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-9517

Опубликовано: 13 авг. 2019
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.

A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server's queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.

Отчет

The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided. This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections. The nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.

Меры по смягчению последствий

The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:

  1. Stop httpd service: $ systemctl stop httpd
  2. Remove http/2 protocol support from configuration files: $ sed -i 's/(h2)|(h2c)//g' <httpd_config_file>
  3. Validate configuration files to make sure all syntax is valid: $ apachectl configtest
  4. Restart httpd service: $ systemctl start httpd

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5nginxNot affected
Red Hat Ansible Tower 3nginxNot affected
Red Hat Enterprise Linux 8nghttp2Not affected
Red Hat Enterprise Linux 8nginx:1.14/nginxNot affected
Red Hat JBoss Core Servicesnghttp2Not affected
Red Hat JBoss Data Grid 7undertowNot affected
Red Hat JBoss Enterprise Application Platform 6jbosswebNot affected
Red Hat JBoss Enterprise Application Platform 7undertowAffected
Red Hat JBoss Enterprise Web Server 3httpdOut of support scope
Red Hat JBoss Fuse 6undertowOut of support scope

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1741868HTTP/2: request for large response leads to denial of service

EPSS

Процентиль: 89%
0.04564
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.

CVSS3: 7.5
nvd
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.

CVSS3: 7.5
debian
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to unconstrained interal da ...

CVSS3: 7.5
github
около 3 лет назад

Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.

oracle-oval
больше 5 лет назад

ELSA-2019-2893: httpd:2.4 security update (IMPORTANT)

EPSS

Процентиль: 89%
0.04564
Низкий

7.5 High

CVSS3