HIGH · 7.5

CVE-2019-9512

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue...

Vulnerability Description

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
AppleSwiftnio>= 1.0.0, <= 1.4.0
AppleMac Os X>= 10.12
CanonicalUbuntu Linux>= 14.04
ApacheTraffic Server>= 6.0.0, <= 6.2.3
DebianDebian Linux10.0
NodejsNode.Js>= 8.0.0, <= 8.8.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-9512?

CVE-2019-9512 is a vulnerability with a CVSS score of 7.5 (HIGH). Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue...

How severe is CVE-2019-9512?

CVE-2019-9512 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-9512?

Check the references section above for vendor advisories and patch information. Affected products include: Apple Swiftnio, Apple Mac Os X, Canonical Ubuntu Linux, Apache Traffic Server, Debian Debian Linux.