vulnerability
Red Hat JBossEAP: Uncontrolled Resource Consumption (CVE-2019-9511)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | 2019-08-13 | 2024-09-19 | 2024-12-20 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
2019-08-13
Added
2024-09-19
Modified
2024-12-20
Description
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.. A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CVE-2019-9511
- https://attackerkb.com/topics/CVE-2019-9511
- URL-https://access.redhat.com/security/cve/CVE-2019-9511
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1741860
- URL-https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- URL-https://kb.cert.org/vuls/id/605641/
- URL-https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
- URL-https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/
- URL-https://access.redhat.com/errata/RHSA-2019:4018
- URL-https://access.redhat.com/errata/RHSA-2019:4019
- URL-https://access.redhat.com/errata/RHSA-2019:4020
- URL-https://access.redhat.com/errata/RHSA-2019:4021

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.