HIGH · 7.5

CVE-2019-9515

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the ...

Vulnerability Description

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
AppleSwiftnio>= 1.0.0, <= 1.4.0
AppleMac Os X>= 10.12
CanonicalUbuntu Linux>= 14.04
ApacheTraffic Server>= 6.0.0, <= 6.2.3
DebianDebian Linux9.0
SynologySkynas-
SynologyDiskstation Manager6.2
SynologyVs960Hd Firmware-
SynologyVs960Hd-
FedoraprojectFedora29
OpensuseLeap15.0
RedhatJboss Core Services1.0
RedhatJboss Enterprise Application Platform7.2.0
RedhatOpenshift Container Platform4.1
RedhatOpenshift Service Mesh1.0
RedhatOpenstack14
RedhatQuay3.0.0
RedhatSingle Sign-On7.3
RedhatSoftware Collections1.0
RedhatEnterprise Linux8.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-9515?

CVE-2019-9515 is a vulnerability with a CVSS score of 7.5 (HIGH). Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the ...

How severe is CVE-2019-9515?

CVE-2019-9515 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-9515?

Check the references section above for vendor advisories and patch information. Affected products include: Apple Swiftnio, Apple Mac Os X, Canonical Ubuntu Linux, Apache Traffic Server, Debian Debian Linux.