5
CVSSv2

CVE-2019-15225

Published: 19/08/2019 Updated: 24/08/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

In Envoy up to and including 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

envoyproxy envoy

Github Repositories

KillEnvoy This is a reproducer for CVE-2019-15225 (see the underlying issue #7728) Steps to reproduce: deploy an Istio control plane and a httpbin service (see httpbinyaml in this repo) build the binary: go build killenvoygo copy the binary to the httpbin container: kubectl cp kill <NS>/<POD>:/tmp/killenvoy -c httpbin run it: kubectl exec -it -n