Allocation of Resources Without Limits or Throttling Affecting nginx package, versions <1.10.3-1+deb9u3
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-NGINX-459584
- published 13 Aug 2019
- disclosed 13 Aug 2019
Introduced: 13 Aug 2019
CVE-2019-9511 Open this link in a new tabHow to fix?
Upgrade Debian:9
nginx
to version 1.10.3-1+deb9u3 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream nginx
package and not the nginx
package as distributed by Debian
.
See How to fix?
for Debian:9
relevant fixed versions and status.
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
References
- ADVISORY
- ADVISORY
- BUGTRAQ
- Bugtraq Mailing List
- CERT-VN
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- DEBIAN
- DEBIAN
- Debian Security Advisory
- FEDORA
- Fedora Security Update
- Fedora Security Update
- Fedora Security Update
- Fedora Security Update
- Fedora Security Update
- MISC
- MISC
- MISC
- MISC
- Netapp Security Advisory
- Netapp Security Advisory
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- REDHAT
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- SUSE
- Ubuntu CVE Tracker
- Ubuntu Security Advisory
- cret@cert.org
- cret@cert.org
- cret@cert.org
- cret@cert.org
- cret@cert.org
- cret@cert.org
- cret@cert.org