vulnerability
Red Hat JBoss EAP: CVE-2019-9517: Uncontrolled Resource Consumption
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Aug 13, 2019 | Sep 19, 2024 | Jul 2, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Aug 13, 2019
Added
Sep 19, 2024
Modified
Jul 2, 2025
Description
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.. A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server's queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-400
- CWE-770
- CVE-2019-9517
- https://attackerkb.com/topics/CVE-2019-9517
- URL-https://access.redhat.com/security/cve/CVE-2019-9517
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1741868
- URL-https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- URL-https://kb.cert.org/vuls/id/605641/
- URL-https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.