Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-9516

Опубликовано: 13 авг. 2019
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8
CVSS3: 6.5

Описание

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

РелизСтатусПримечание
bionic

released

1.14.0-0ubuntu1.4
cosmic

ignored

end of life, was needed
devel

released

1.16.1-0ubuntu1
disco

released

1.15.9-0ubuntu1.1
esm-infra-legacy/trusty

not-affected

http2 support not implemented
esm-infra/bionic

released

1.14.0-0ubuntu1.4
esm-infra/xenial

released

1.10.3-0ubuntu0.16.04.4
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

not-affected

http2 support not implemented

Показывать по

6.8 Medium

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
больше 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
nvd
больше 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 6.5
debian
больше 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potential ...

CVSS3: 6.5
github
больше 3 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

6.8 Medium

CVSS2

6.5 Medium

CVSS3