Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-9511

Опубликовано: 13 авг. 2019
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 7.8
CVSS3: 7.5

Описание

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

1.39.2-1
disco

ignored

end of life
eoan

not-affected

1.39.2-1
esm-apps/xenial

released

1.7.1-1ubuntu0.1~esm2
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

1.30.0-1ubuntu1+esm2
esm-infra/focal

not-affected

1.39.2-1
focal

not-affected

1.39.2-1

Показывать по

РелизСтатусПримечание
bionic

released

1.14.0-0ubuntu1.4
cosmic

ignored

end of life
devel

released

1.16.1-0ubuntu1
disco

released

1.15.9-0ubuntu1.1
eoan

released

1.16.1-0ubuntu1
esm-infra-legacy/trusty

not-affected

http2 support not implemented
esm-infra/bionic

not-affected

1.14.0-0ubuntu1.4
esm-infra/focal

not-affected

1.16.1-0ubuntu1
esm-infra/xenial

not-affected

1.10.3-0ubuntu0.16.04.4
focal

released

1.16.1-0ubuntu1

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

18.13.0+dfsg1-1ubuntu2
esm-apps/bionic

ignored

changes too intrusive
esm-apps/focal

not-affected

10.19.0~dfsg-3ubuntu1
esm-apps/jammy

not-affected

12.22.9~dfsg-1ubuntu3
esm-apps/noble

not-affected

18.13.0+dfsg1-1ubuntu2
esm-apps/xenial

ignored

changes too intrusive
esm-infra-legacy/trusty

ignored

changes too intrusive
focal

not-affected

10.19.0~dfsg-3ubuntu1
groovy

ignored

end of life

Показывать по

EPSS

Процентиль: 94%
0.13948
Средний

7.8 High

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
nvd
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
msrc
почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
debian
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation ...

CVSS3: 7.5
github
около 3 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

EPSS

Процентиль: 94%
0.13948
Средний

7.8 High

CVSS2

7.5 High

CVSS3

Уязвимость CVE-2019-9511