Vulnerability Description
Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tendermint | Tendermint | < 0.31.1 |
Related Weaknesses (CWE)
References
- https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aaPatchThird Party Advisory
- https://github.com/tendermint/tendermint/pull/3430Third Party Advisory
- https://pkg.go.dev/vuln/GO-2020-0037Third Party Advisory
- https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aaPatchThird Party Advisory
- https://github.com/tendermint/tendermint/pull/3430Third Party Advisory
- https://pkg.go.dev/vuln/GO-2020-0037Third Party Advisory
FAQ
What is CVE-2019-25072?
CVE-2019-25072 is a vulnerability with a CVSS score of 7.5 (HIGH). Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, whic...
How severe is CVE-2019-25072?
CVE-2019-25072 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-25072?
Check the references section above for vendor advisories and patch information. Affected products include: Tendermint Tendermint.