[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

HTTP/2: flood using SETTINGS frames results in unbounded memory growth - CVE-2019-9515

ID: oval:org.secpod.oval:def:58206Date: (C)2019-10-10   (M)2023-12-20
Class: VULNERABILITYFamily: unix




Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

Platform:
Red Hat Enterprise Linux 8
Product:
nodejs
Reference:
CVE-2019-9515
CVE    1
CVE-2019-9515
CPE    2
cpe:/o:redhat:enterprise_linux:8
cpe:/a:nodejs:nodejs

© SecPod Technologies