Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-9514

Опубликовано: 13 авг. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.8
CVSS3: 7.5

Описание

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

РелизСтатусПримечание
bionic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

DNE

disco

ignored

end of life
eoan

DNE

esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

needed

esm-infra/focal

DNE

esm-infra/xenial

needs-triage

focal

DNE

groovy

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

disco

ignored

end of life
eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

disco

ignored

end of life
eoan

ignored

end of life
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

esm-infra/xenial

needs-triage

focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

DNE

disco

DNE

eoan

DNE

esm-apps/bionic

needed

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

DNE

disco

DNE

eoan

DNE

esm-apps/bionic

needed

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

needed

disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/jammy

needed

esm-apps/noble

needed

esm-apps/xenial

needed

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

needed

disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/jammy

needed

esm-apps/noble

needed

esm-apps/xenial

needed

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

2.2.5+dfsg2-3
disco

released

2.2.5+dfsg2-2+deb10u1build0.19.04.1
eoan

not-affected

2.2.5+dfsg2-3
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

2.2.5+dfsg2-3
esm-apps/jammy

not-affected

2.2.5+dfsg2-3
esm-apps/noble

not-affected

2.2.5+dfsg2-3
esm-infra-legacy/trusty

DNE

focal

not-affected

2.2.5+dfsg2-3

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

released

1:4.1.7-4ubuntu0.1+esm1
esm-apps/focal

not-affected

esm-apps/jammy

not-affected

esm-apps/noble

not-affected

esm-apps/xenial

not-affected

http2 support not implemented

Показывать по

РелизСтатусПримечание
bionic

not-affected

fixed for CVE-2018-16844
cosmic

not-affected

fixed for CVE-2018-16844
devel

not-affected

fixed for CVE-2018-16844
disco

not-affected

fixed for CVE-2018-16844
eoan

not-affected

fixed for CVE-2018-16844
esm-infra-legacy/trusty

not-affected

http2 support not implemented
esm-infra/bionic

not-affected

fixed for CVE-2018-16844
esm-infra/focal

not-affected

fixed for CVE-2018-16844
esm-infra/xenial

not-affected

fixed for CVE-2018-16844
focal

not-affected

fixed for CVE-2018-16844

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

18.13.0+dfsg1-1ubuntu2
esm-apps/bionic

ignored

changes too intrusive
esm-apps/focal

not-affected

10.19.0~dfsg-3ubuntu1
esm-apps/jammy

not-affected

12.22.9~dfsg-1ubuntu3
esm-apps/noble

not-affected

18.13.0+dfsg1-1ubuntu2
esm-apps/xenial

ignored

changes too intrusive
esm-infra-legacy/trusty

ignored

changes too intrusive
focal

not-affected

10.19.0~dfsg-3ubuntu1
groovy

ignored

end of life

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

8.0.5+ds-1
disco

ignored

end of life
eoan

not-affected

8.0.5+ds-1
esm-apps/bionic

needed

esm-apps/focal

not-affected

8.0.5+ds-1
esm-apps/jammy

not-affected

8.0.5+ds-1
esm-apps/noble

not-affected

8.0.5+ds-1
esm-apps/xenial

needs-triage

Показывать по

РелизСтатусПримечание
bionic

released

17.9.0-2ubuntu0.1
cosmic

ignored

end of life
devel

released

18.9.0-6ubuntu1
disco

ignored

end of life
eoan

released

18.9.0-3ubuntu1.1
esm-infra-legacy/trusty

not-affected

http2 support not implemented
esm-infra/bionic

not-affected

17.9.0-2ubuntu0.1
esm-infra/focal

not-affected

18.9.0-6ubuntu1
esm-infra/xenial

not-affected

http2 support not implemented
focal

released

18.9.0-6ubuntu1

Показывать по

EPSS

Процентиль: 92%
0.08585
Низкий

7.8 High

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
nvd
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
msrc
почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
debian
почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potential ...

CVSS3: 7.5
github
около 3 лет назад

golang.org/x/net/http vulnerable to a reset flood

EPSS

Процентиль: 92%
0.08585
Низкий

7.8 High

CVSS2

7.5 High

CVSS3

Уязвимость CVE-2019-9514