Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apple swiftnio |
||
apache traffic server |
||
canonical ubuntu linux 16.04 |
||
canonical ubuntu linux 18.04 |
||
canonical ubuntu linux 19.04 |
||
debian debian linux 9.0 |
||
debian debian linux 10.0 |
||
synology skynas - |
||
synology diskstation manager 6.2 |
||
synology vs960hd firmware - |
||
fedoraproject fedora 29 |
||
fedoraproject fedora 30 |
||
opensuse leap 15.0 |
||
opensuse leap 15.1 |
||
redhat jboss core services 1.0 |
||
redhat jboss enterprise application platform 7.2.0 |
||
redhat jboss enterprise application platform 7.3.0 |
||
redhat openshift service mesh 1.0 |
||
redhat quay 3.0.0 |
||
redhat software collections 1.0 |
||
redhat enterprise linux 8.0 |
||
oracle graalvm 19.2.0 |
||
mcafee web gateway |
||
nodejs node.js |
This month the vendor has patched 93 vulnerabilities, 27 of which are rated Critical.
Posted: 14 Aug, 201926 Min ReadThreat Intelligence SubscribeFollowtwitterfacebooklinkedinMicrosoft Patch Tuesday – August 2019This month the vendor has patched 93 vulnerabilities, 27 of which are rated Critical.This month Microsoft has patched 93 vulnerabilities, 27 of which are rated Critical. As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all sof...
Beware the denials of service: Netflix warns of eight networking bugs
On Tuesday, Netflix, working in conjunction with Google and CERT/CC, published a security advisory covering a series of vulnerabilities that enable denial of service attacks against servers running HTTP/2 services. HTTP/2, like earlier versions, governs the application layer of the internet stack; it runs atop the transport layer (TCP), the network layer (IP), and data link layer of the internet. The eight CVEs disclosed do not allow information disclosure or modification, but they could be empl...