Lucene search

K
cve[email protected]CVE-2019-9516
HistoryAug 13, 2019 - 9:15 p.m.

CVE-2019-9516

2019-08-1321:15:12
CWE-770
CWE-400
web.nvd.nist.gov
2824
4
cve-2019-9516
http/2
vulnerability
denial of service
header leak
nvd

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

7.1 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

79.8%

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

Affected configurations

NVD
Node
appleswiftnioRange1.0.01.4.0
AND
applemac_os_xRange10.12
OR
canonicalubuntu_linuxRange14.04
Node
apachetraffic_serverRange6.0.06.2.3
OR
apachetraffic_serverRange7.0.07.1.6
OR
apachetraffic_serverRange8.0.08.0.3
Node
canonicalubuntu_linuxMatch16.04lts
OR
canonicalubuntu_linuxMatch18.04lts
OR
canonicalubuntu_linuxMatch19.04
Node
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
OR
fedoraprojectfedoraMatch30
Node
synologydiskstation_managerMatch6.2
OR
synologyskynasMatch-
Node
synologyvs960hd_firmwareMatch-
AND
synologyvs960hdMatch-
Node
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
Node
fedoraprojectfedoraMatch29
OR
fedoraprojectfedoraMatch30
OR
fedoraprojectfedoraMatch32
Node
opensuseleapMatch15.0
OR
opensuseleapMatch15.1
Node
redhatjboss_core_servicesMatch1.0
OR
redhatjboss_enterprise_application_platformMatch7.2.0
OR
redhatjboss_enterprise_application_platformMatch7.3.0
OR
redhatopenshift_service_meshMatch1.0
OR
redhatquayMatch3.0.0
OR
redhatsoftware_collectionsMatch1.0
OR
redhatenterprise_linuxMatch8.0
Node
oraclegraalvmMatch19.2.0enterprise
Node
mcafeeweb_gatewayRange7.7.2.07.7.2.24
OR
mcafeeweb_gatewayRange7.8.2.07.8.2.13
OR
mcafeeweb_gatewayRange8.1.08.2.0
Node
f5nginxRange1.9.51.16.1
OR
f5nginxRange1.17.01.17.2
Node
nodejsnode.jsRange8.0.08.16.1lts
OR
nodejsnode.jsRange10.0.010.16.3lts
OR
nodejsnode.jsRange12.0.012.8.1-
CPENameOperatorVersion
apple:swiftnioapple swiftniole1.4.0

References

Social References

More

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

7.1 High

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

79.8%