Логотип exploitDog
bind:CVE-2019-9515
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-9515

Количество 15

Количество 15

ubuntu логотип

CVE-2019-9515

около 6 лет назад

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2019-9515

около 6 лет назад

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2019-9515

около 6 лет назад

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2019-9515

около 6 лет назад

Some HTTP/2 implementations are vulnerable to a settings flood, potent ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-9259-5376-vjcj

больше 3 лет назад

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2019-03646

около 6 лет назад

Уязвимость компонента connection.c сетевого протокола HTTP/2 веб-сервера Apache Traffic Server, веб-сервера H2O, программной платформы Node.js, сетевого программного средства SwiftNIO, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2019:2115-1

около 6 лет назад

Security update for nodejs8

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2114-1

около 6 лет назад

Security update for nodejs10

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2260-1

около 6 лет назад

Security update for nodejs8

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2259-1

около 6 лет назад

Security update for nodejs10

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2254-1

около 6 лет назад

Security update for nodejs10

EPSS: Низкий
oracle-oval логотип

ELSA-2019-2925

около 6 лет назад

ELSA-2019-2925: nodejs:10 security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0059-1

почти 6 лет назад

Security update for nodejs12

EPSS: Низкий
rocky логотип

RLSA-2019:2925

около 6 лет назад

Important: nodejs:10 security update

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14246-1

почти 6 лет назад

Security update for Mozilla Firefox

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-9515

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
11%
Средний
около 6 лет назад
redhat логотип
CVE-2019-9515

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
11%
Средний
около 6 лет назад
nvd логотип
CVE-2019-9515

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
11%
Средний
около 6 лет назад
debian логотип
CVE-2019-9515

Some HTTP/2 implementations are vulnerable to a settings flood, potent ...

CVSS3: 7.5
11%
Средний
около 6 лет назад
github логотип
GHSA-9259-5376-vjcj

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
11%
Средний
больше 3 лет назад
fstec логотип
BDU:2019-03646

Уязвимость компонента connection.c сетевого протокола HTTP/2 веб-сервера Apache Traffic Server, веб-сервера H2O, программной платформы Node.js, сетевого программного средства SwiftNIO, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
11%
Средний
около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2115-1

Security update for nodejs8

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2114-1

Security update for nodejs10

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2260-1

Security update for nodejs8

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2259-1

Security update for nodejs10

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2254-1

Security update for nodejs10

около 6 лет назад
oracle-oval логотип
ELSA-2019-2925

ELSA-2019-2925: nodejs:10 security update (IMPORTANT)

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0059-1

Security update for nodejs12

почти 6 лет назад
rocky логотип
RLSA-2019:2925

Important: nodejs:10 security update

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14246-1

Security update for Mozilla Firefox

почти 6 лет назад

Уязвимостей на страницу