Unrated severityNVD Advisory· Published Aug 13, 2019· Updated Aug 4, 2024
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service
CVE-2019-9511
Description
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
Affected products
62- HTTP/2/HTTP/2description
- osv-coords61 versionspkg:rpm/almalinux/nginxpkg:rpm/almalinux/nginx-all-modulespkg:rpm/almalinux/nginx-filesystempkg:rpm/almalinux/nginx-mod-http-image-filterpkg:rpm/almalinux/nginx-mod-http-perlpkg:rpm/almalinux/nginx-mod-http-xslt-filterpkg:rpm/almalinux/nginx-mod-mailpkg:rpm/almalinux/nginx-mod-streampkg:rpm/almalinux/nodejs-nodemonpkg:rpm/almalinux/nodejs-packagingpkg:rpm/opensuse/nghttp2&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/nghttp2&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/nghttp2&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/nghttp2-python&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/nghttp2-python&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/nginx&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/nginx&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/nginx&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/nodejs10&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/nodejs10&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/nodejs8&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/nodejs8&distro=openSUSE%20Leap%2015.1pkg:rpm/suse/firefox-atk&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-cairo&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-gdk-pixbuf&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-glib2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-harfbuzz&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-libffi&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-libffi-gcc5&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/firefox-pango&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/nghttp2&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/nghttp2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/nghttp2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/nghttp2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/nghttp2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/nghttp2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/nghttp2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/nghttp2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/nghttp2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/nghttp2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/nghttp2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/nghttp2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/nghttp2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/nghttp2&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/nghttp2&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/nghttp2&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/nghttp2&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/nghttp2&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/nginx&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015pkg:rpm/suse/nginx&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP1pkg:rpm/suse/nodejs10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012pkg:rpm/suse/nodejs10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015pkg:rpm/suse/nodejs10&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP1pkg:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012pkg:rpm/suse/nodejs8&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015pkg:rpm/suse/nodejs8&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015%20SP1
< 1:1.14.1-9.module_el8.5.0+34+dc1cfba5.alma+ 60 more
- (no CPE)range: < 1:1.14.1-9.module_el8.5.0+34+dc1cfba5.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.4.0+2221+af250afe.alma
- (no CPE)range: < 1:1.14.1-9.module_el8.3.0+2165+af250afe.alma
- (no CPE)range: < 1.18.3-1.module_el8.3.0+2023+d2377ea3
- (no CPE)range: < 17-3.module_el8.4.0+2224+b07ac28e
- (no CPE)range: < 1.39.2-lp150.2.3.1
- (no CPE)range: < 1.39.2-lp151.3.3.1
- (no CPE)range: < 1.43.0-1.6
- (no CPE)range: < 1.39.2-lp150.2.3.1
- (no CPE)range: < 1.39.2-lp151.3.3.1
- (no CPE)range: < 1.14.2-lp150.2.11.1
- (no CPE)range: < 1.14.2-lp151.4.3.1
- (no CPE)range: < 1.21.3-1.4
- (no CPE)range: < 10.16.3-lp151.2.6.1
- (no CPE)range: < 10.16.3-lp151.2.6.1
- (no CPE)range: < 8.16.1-lp151.2.6.1
- (no CPE)range: < 8.16.1-lp151.2.6.1
- (no CPE)range: < 2.26.1-2.8.4
- (no CPE)range: < 1.15.10-2.13.4
- (no CPE)range: < 2.36.11-2.8.4
- (no CPE)range: < 2.54.3-2.14.7
- (no CPE)range: < 3.10.9-2.15.3
- (no CPE)range: < 1.7.5-2.7.4
- (no CPE)range: < 3.2.1.git259-2.3.3
- (no CPE)range: < 5.3.1+r233831-14.1
- (no CPE)range: < 1.40.14-2.7.4
- (no CPE)range: < 68-21.9.8
- (no CPE)range: < 68.2.0-78.51.4
- (no CPE)range: < 4.21-29.6.1
- (no CPE)range: < 3.45-38.9.3
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.3.1
- (no CPE)range: < 1.39.2-3.3.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.39.2-3.5.1
- (no CPE)range: < 1.14.2-3.6.1
- (no CPE)range: < 1.14.2-6.3.1
- (no CPE)range: < 10.16.3-1.12.1
- (no CPE)range: < 10.16.3-1.12.1
- (no CPE)range: < 10.16.3-1.12.1
- (no CPE)range: < 12.13.0-1.3.1
- (no CPE)range: < 8.16.1-3.20.1
- (no CPE)range: < 8.16.1-3.20.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
47- lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.htmlmitrevendor-advisoryx_refsource_SUSE
- access.redhat.com/errata/RHSA-2019:2692mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2745mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2746mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2775mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2799mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2925mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2939mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2949mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2955mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:2966mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:3041mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:3932mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:3933mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:3935mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:4018mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:4019mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:4020mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:4021mitrevendor-advisoryx_refsource_REDHAT
- kb.cert.org/vuls/id/605641/mitrethird-party-advisoryx_refsource_CERT-VN
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/mitrevendor-advisoryx_refsource_FEDORA
- usn.ubuntu.com/4099-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2019/dsa-4505mitrevendor-advisoryx_refsource_DEBIAN
- www.debian.org/security/2019/dsa-4511mitrevendor-advisoryx_refsource_DEBIAN
- www.debian.org/security/2020/dsa-4669mitrevendor-advisoryx_refsource_DEBIAN
- github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.mdmitrex_refsource_MISC
- kc.mcafee.com/corporate/indexmitrex_refsource_CONFIRM
- seclists.org/bugtraq/2019/Aug/40mitremailing-listx_refsource_BUGTRAQ
- seclists.org/bugtraq/2019/Sep/1mitremailing-listx_refsource_BUGTRAQ
- security.netapp.com/advisory/ntap-20190823-0002/mitrex_refsource_CONFIRM
- security.netapp.com/advisory/ntap-20190823-0005/mitrex_refsource_CONFIRM
- support.f5.com/csp/article/K02591030mitrex_refsource_CONFIRM
- support.f5.com/csp/article/K02591030mitrex_refsource_CONFIRM
- www.oracle.com/security-alerts/cpujan2021.htmlmitrex_refsource_MISC
- www.oracle.com/security-alerts/cpuoct2020.htmlmitrex_refsource_MISC
- www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlmitrex_refsource_MISC
- www.synology.com/security/advisory/Synology_SA_19_33mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.