Количество 25
Количество 25
BDU:2020-04461
Уязвимость библиотеки nghttp2, связанная с ошибками при использовании выделенной памяти при обработке пакетов HTTP/2 SETTINGS, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2020-11080
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
CVE-2020-11080
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
CVE-2020-11080
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
CVE-2020-11080
Denial of service in nghttp2
CVE-2020-11080
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra ...
openSUSE-SU-2021:0468-1
Security update for nghttp2
SUSE-SU-2021:0931-1
Security update for nghttp2
SUSE-SU-2021:0930-1
Security update for nghttp2
RLSA-2020:2755
Important: nghttp2 security update
ELSA-2020-2755
ELSA-2020-2755: nghttp2 security update (IMPORTANT)
openSUSE-SU-2020:0802-1
Security update for nodejs8
SUSE-SU-2020:1576-1
Security update for nodejs8
RLSA-2020:2848
Important: nodejs:10 security update
ELSA-2020-2848
ELSA-2020-2848: nodejs:10 security update (IMPORTANT)
SUSE-SU-2020:2800-1
Security update for nodejs8
SUSE-SU-2020:1606-1
Security update for nodejs12
SUSE-SU-2020:1575-1
Security update for nodejs10
SUSE-SU-2020:1568-1
Security update for nodejs10
RLSA-2020:2852
Important: nodejs:12 security update
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2020-04461 Уязвимость библиотеки nghttp2, связанная с ошибками при использовании выделенной памяти при обработке пакетов HTTP/2 SETTINGS, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | больше 5 лет назад | |
CVE-2020-11080 In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection. | CVSS3: 3.7 | 1% Низкий | больше 5 лет назад | |
CVE-2020-11080 In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection. | CVSS3: 7.5 | 1% Низкий | больше 5 лет назад | |
CVE-2020-11080 In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection. | CVSS3: 3.7 | 1% Низкий | больше 5 лет назад | |
CVE-2020-11080 Denial of service in nghttp2 | CVSS3: 7.5 | 1% Низкий | около 5 лет назад | |
CVE-2020-11080 In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra ... | CVSS3: 3.7 | 1% Низкий | больше 5 лет назад | |
openSUSE-SU-2021:0468-1 Security update for nghttp2 | 1% Низкий | больше 4 лет назад | ||
SUSE-SU-2021:0931-1 Security update for nghttp2 | 1% Низкий | больше 4 лет назад | ||
SUSE-SU-2021:0930-1 Security update for nghttp2 | 1% Низкий | больше 4 лет назад | ||
RLSA-2020:2755 Important: nghttp2 security update | 1% Низкий | больше 5 лет назад | ||
ELSA-2020-2755 ELSA-2020-2755: nghttp2 security update (IMPORTANT) | больше 5 лет назад | |||
openSUSE-SU-2020:0802-1 Security update for nodejs8 | больше 5 лет назад | |||
SUSE-SU-2020:1576-1 Security update for nodejs8 | больше 5 лет назад | |||
RLSA-2020:2848 Important: nodejs:10 security update | больше 5 лет назад | |||
ELSA-2020-2848 ELSA-2020-2848: nodejs:10 security update (IMPORTANT) | больше 5 лет назад | |||
SUSE-SU-2020:2800-1 Security update for nodejs8 | около 5 лет назад | |||
SUSE-SU-2020:1606-1 Security update for nodejs12 | больше 5 лет назад | |||
SUSE-SU-2020:1575-1 Security update for nodejs10 | больше 5 лет назад | |||
SUSE-SU-2020:1568-1 Security update for nodejs10 | больше 5 лет назад | |||
RLSA-2020:2852 Important: nodejs:12 security update | больше 5 лет назад |
Уязвимостей на страницу