Allocation of Resources Without Limits or Throttling
CVE-2019-9514
Summary
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of "RST_STREAM" frames from the peer. Depending on how the peer queues the "RST_STREAM" frames, this can consume excess memory, CPU, or both. This issue affects Go-github.com/golang/net, Go-golang.org/x/net versions prior to 0.0.0-20190813141303-74dc4d7220e7, Cpp-h2o versions prior to 2.2.6, Cpp-trafficserver versions 6.0.0 through 6.2.3, 7.0.0 through 7.1.6 and 8.0.0 through 8.0.3 and Maven-io.netty:netty-codec-http2 and Maven-io.netty:netty-all versions prior to 4.1.39.Final.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- NONE
- HIGH
CWE-770 - Allocation of Resources Without Limits or Throttling
The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
References
Advisory Timeline
- Published