7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.097 Low
EPSS
Percentile
94.7%
Severity: Medium
Date : 2019-08-16
CVE-ID : CVE-2019-9511 CVE-2019-9513 CVE-2019-9516
Package : nginx-mainline
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-1022
The package nginx-mainline before version 1.17.3-1 is vulnerable to
denial of service.
Upgrade to 1.17.3-1.
The problems have been fixed upstream in version 1.17.3.
Disable http/2 support.
An issue has been found in several HTTP/2 implementations, where the
attacker requests a large amount of data from a specified resource over
multiple streams. They manipulate window size and stream priority to
force the server to queue the data in 1-byte chunks. Depending on how
efficiently this data is queued, this can consume excess CPU, memory,
or both, potentially leading to a denial of service.
An issue has been found in several HTTP/2 implementations, where the
attacker creates multiple request streams and continually shuffles the
priority of the streams in a way that causes substantial churn to the
priority tree. This can consume excess CPU, potentially leading to a
denial of service.
An issue has been found in several HTTP/2 implementations, where the
attacker sends a stream of headers with a 0-length header name and
0-length header value, optionally Huffman encoded into 1-byte or
greater headers. Some implementations allocate memory for these headers
and keep the allocation alive until the session dies. This can consume
excess memory, potentially leading to a denial of service.
A remote attacker is able cause a denial of service by sending a
specially crafted packet.
https://mailman.nginx.org/pipermail/nginx-announce/2019/000249.html
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://github.com/nginx/nginx/commit/a987f81dd19210bc30b62591db331e31d3d74089
https://github.com/nginx/nginx/commit/5ae726912654da10a9a81b2c8436829f3e94f69f
https://github.com/nginx/nginx/commit/6dfbc8b1c2116f362bb871efebbf9df576738e89
https://security.archlinux.org/CVE-2019-9511
https://security.archlinux.org/CVE-2019-9513
https://security.archlinux.org/CVE-2019-9516
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ArchLinux | any | any | nginx-mainline | < 1.17.3-1 | UNKNOWN |
github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
github.com/nginx/nginx/commit/5ae726912654da10a9a81b2c8436829f3e94f69f
github.com/nginx/nginx/commit/6dfbc8b1c2116f362bb871efebbf9df576738e89
github.com/nginx/nginx/commit/a987f81dd19210bc30b62591db331e31d3d74089
mailman.nginx.org/pipermail/nginx-announce/2019/000249.html
security.archlinux.org/AVG-1022
security.archlinux.org/CVE-2019-9511
security.archlinux.org/CVE-2019-9513
security.archlinux.org/CVE-2019-9516
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.097 Low
EPSS
Percentile
94.7%