[NGINX:CVE-2019-9511] Excessive CPU usage in HTTP/2 with small window updates

Severity Medium
Affected Packages 1
Unaffected Packages 2
CVEs 1

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

Package Affected Version
pkg:nginx/nginx >= 1.9.5, <= 1.17.2
Package Unaffected Version
pkg:nginx/nginx >= 1.17.3
pkg:nginx/nginx >= 1.16.1
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:nginx/nginx nginx >= 1.9.5 <= 1.17.2
Unaffected pkg:nginx/nginx nginx >= 1.17.3
Unaffected pkg:nginx/nginx nginx >= 1.16.1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...