CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
92.1%
Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
seclists.org/fulldisclosure/2019/Aug/16
access.redhat.com/errata/RHSA-2019:2766
access.redhat.com/errata/RHSA-2019:2796
access.redhat.com/errata/RHSA-2019:2861
access.redhat.com/errata/RHSA-2019:2925
access.redhat.com/errata/RHSA-2019:2939
access.redhat.com/errata/RHSA-2019:2955
access.redhat.com/errata/RHSA-2019:3892
access.redhat.com/errata/RHSA-2019:4018
access.redhat.com/errata/RHSA-2019:4019
access.redhat.com/errata/RHSA-2019:4020
access.redhat.com/errata/RHSA-2019:4021
access.redhat.com/errata/RHSA-2019:4040
access.redhat.com/errata/RHSA-2019:4041
access.redhat.com/errata/RHSA-2019:4042
access.redhat.com/errata/RHSA-2019:4045
access.redhat.com/errata/RHSA-2019:4352
access.redhat.com/errata/RHSA-2020:0727
github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
kb.cert.org/vuls/id/605641/
kc.mcafee.com/corporate/index?page=content&id=SB10296
lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E
lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E
lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/
seclists.org/bugtraq/2019/Aug/24
seclists.org/bugtraq/2019/Aug/43
seclists.org/bugtraq/2019/Sep/18
security.netapp.com/advisory/ntap-20190823-0005/
support.f5.com/csp/article/K50233772
support.f5.com/csp/article/K50233772?utm_source=f5support&%3Butm_medium=RSS
usn.ubuntu.com/4308-1/
www.debian.org/security/2019/dsa-4508
www.debian.org/security/2019/dsa-4520
www.synology.com/security/advisory/Synology_SA_19_33
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
92.1%