Lucene search

K
nessusTenable701146.PRM
HistoryAug 14, 2019 - 12:00 a.m.

nginx < 1.16.1 (stable) / 1.17.3 (mainline) Multiple DoS

2019-08-1400:00:00
Tenable
www.tenable.com
25

The remote web server is running a version of nginx that is affected by the following vulnerabilities:

  • A vulnerability exists that involves window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. An attacker can manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. (CVE-2019-9511)
  • The affected versions of nginx are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU. (CVE-2019-9513)
  • The affected versions of nginx vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory. (CVE-2019-9516)
Binary data 701146.prm
VendorProductVersionCPE
igor_sysoevnginxcpe:/a:igor_sysoev:nginx