HIGH · 7.5

CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data ...

Vulnerability Description

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
AppleSwiftnio>= 1.0.0, <= 1.4.0
AppleMac Os X>= 10.12
CanonicalUbuntu Linux>= 14.04
ApacheTraffic Server>= 6.0.0, <= 6.2.3
DebianDebian Linux9.0
SynologySkynas-
SynologyDiskstation Manager6.2
SynologyVs960Hd Firmware-
SynologyVs960Hd-
FedoraprojectFedora29
OpensuseLeap15.0
RedhatJboss Core Services1.0
RedhatJboss Enterprise Application Platform7.2.0
RedhatOpenshift Service Mesh1.0
RedhatQuay3.0.0
RedhatSoftware Collections1.0
RedhatEnterprise Linux8.0
OracleGraalvm19.2.0
McafeeWeb Gateway>= 7.7.2.0, < 7.7.2.24
F5Nginx>= 1.9.5, < 1.16.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-9511?

CVE-2019-9511 is a vulnerability with a CVSS score of 7.5 (HIGH). Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data ...

How severe is CVE-2019-9511?

CVE-2019-9511 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-9511?

Check the references section above for vendor advisories and patch information. Affected products include: Apple Swiftnio, Apple Mac Os X, Canonical Ubuntu Linux, Apache Traffic Server, Debian Debian Linux.