Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:7430089B5BD03FDE67C945B0672A675E
HistoryDec 03, 2019 - 12:00 a.m.

Various HTTP2 CVEs: Some Cloud Foundry products are impacted by HTTP denial of service attacks | Cloud Foundry

2019-12-0300:00:00
Cloud Foundry
www.cloudfoundry.org
60

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.821 High

EPSS

Percentile

98.3%

Severity

High

Vendor

Cloud Foundry Foundation

Description

Some Cloud Foundry products, through their consumption of imperfect HTTP2 implementations, are impacted by various HTTP vulnerabilities, including Data Dribble, Ping Flood, Resource Loop, Reset Flood, Settings Flood, 0-Length Headers Leak, Internal Data Buffering, and Empty Frames Flood. A remote attacker could cause a denial of service by exploiting these weaknesses.

Affected Cloud Foundry Products and Versions

  • CF Deployment
    • All versions prior to v12.2.0
  • Xenial Stemcells
    • 97 versions prior to 97.151
    • 170 versions prior to 170.124
    • 250 versions prior to 250.99
    • 315 versions prior to 315.89
    • 456 versions prior to 456.16
  • BOSH Deployment
    • All versions prior to 270.6.0
  • Diego (OSS)
    • All versions prior to v2.37.0
  • CredHub CLI
    • All versions prior to 2.5.3
  • CAPI (OSS)
    • All versions prior to 1.87.0
  • Garden-runC
    • All versions prior to v1.19.7

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:

  • CF Deployment
    • Upgrade All versions to v12.2.0 or greater
  • Xenial Stemcells
    • Upgrade 97 versions to 97.151 or greater
    • Upgrade 315 versions to 315.89 or greater
    • Upgrade 456 versions to 456.16 or greater
    • Upgrade 170 versions to 170.124 or greater
    • Upgrade 250 versions to 250.99 or greater
  • BOSH Deployment
    • Upgrade All versions to 270.6.0 or greater
  • Diego (OSS)
    • Upgrade All versions to v2.37.0 or greater
  • CredHub CLI
    • Upgrade All versions to 2.5.3 or greater
  • CAPI (OSS)
    • Upgrade All versions to 1.87.0 or greater
  • Garden-runC
    • Upgrade All versions to v1.19.7 or greater

References

History

2019-12-03: Initial vulnerability report published.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.821 High

EPSS

Percentile

98.3%