Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2019-9515

Published: August 31, 2023Last modified: August 31, 2023

Description

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

Severity score breakdown

ParameterValue
Base score7.5
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityNONE
Integrity impactNONE
Availability impactHIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTScontainerdNot affected (1.6.18-r2)
nodejsNot affected (18.17.1-r0)
py3-twistedNot affected (22.10.0-r1)
StreamcontainerdNot affected (1.7.5-r0)
nodejsNot affected (18.17.1-r0)
py3-twistedNot affected (22.10.0-r3)

References

ON THIS PAGE