Vulnerability Description
Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Swiftnio | >= 1.0.0, <= 1.4.0 |
| Apple | Mac Os X | >= 10.12 |
| Canonical | Ubuntu Linux | >= 14.04 |
| Apache | Traffic Server | >= 6.0.0, <= 6.2.3 |
| Debian | Debian Linux | 9.0 |
| Synology | Skynas | - |
| Synology | Diskstation Manager | 6.2 |
| Synology | Vs960Hd Firmware | - |
| Synology | Vs960Hd | - |
| Fedoraproject | Fedora | 29 |
| Opensuse | Leap | 15.0 |
| Redhat | Jboss Core Services | 1.0 |
| Redhat | Jboss Enterprise Application Platform | 7.2.0 |
| Redhat | Openshift Container Platform | 4.1 |
| Redhat | Openshift Service Mesh | 1.0 |
| Redhat | Openstack | 14 |
| Redhat | Quay | 3.0.0 |
| Redhat | Single Sign-On | 7.3 |
| Redhat | Software Collections | 1.0 |
| Redhat | Enterprise Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.htmlMailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2019/Aug/16Mailing ListThird Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2766Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2796Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2861Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2925Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2939Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2955Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:3892Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:4018Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:4019Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:4020Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:4021Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:4040Third Party Advisory
FAQ
What is CVE-2019-9515?
CVE-2019-9515 is a vulnerability with a CVSS score of 7.5 (HIGH). Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the ...
How severe is CVE-2019-9515?
CVE-2019-9515 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-9515?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Swiftnio, Apple Mac Os X, Canonical Ubuntu Linux, Apache Traffic Server, Debian Debian Linux.