Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-11080

Опубликовано: 02 июн. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8nodejs:14/nodejsNot affected
JBoss Core Services on RHEL 6jbcs-httpd24-curlFixedRHSA-2020:264422.06.2020
JBoss Core Services on RHEL 6jbcs-httpd24-httpdFixedRHSA-2020:264422.06.2020
JBoss Core Services on RHEL 6jbcs-httpd24-mod_cluster-nativeFixedRHSA-2020:264422.06.2020
JBoss Core Services on RHEL 6jbcs-httpd24-mod_http2FixedRHSA-2020:264422.06.2020
JBoss Core Services on RHEL 6jbcs-httpd24-mod_jkFixedRHSA-2020:264422.06.2020
JBoss Core Services on RHEL 6jbcs-httpd24-mod_mdFixedRHSA-2020:264422.06.2020
JBoss Core Services on RHEL 6jbcs-httpd24-mod_securityFixedRHSA-2020:264422.06.2020
JBoss Core Services on RHEL 6jbcs-httpd24-nghttp2FixedRHSA-2020:264422.06.2020
JBoss Core Services on RHEL 7jbcs-httpd24-curlFixedRHSA-2020:264422.06.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=1844929nghttp2: overly large SETTINGS frames can lead to DoS

EPSS

Процентиль: 72%
0.00741
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 3.7
ubuntu
около 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 3.7
nvd
около 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

CVSS3: 7.5
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 3.7
debian
около 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra ...

suse-cvrf
около 4 лет назад

Security update for nghttp2

EPSS

Процентиль: 72%
0.00741
Низкий

7.5 High

CVSS3

Уязвимость CVE-2020-11080