Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
2019-08-13T21:15:12.287
2024-11-21T04:51:46.193
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:C
10.0
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apple | swiftnio | ≤ 1.4.0 | Yes |
Operating System | apple | mac_os_x | ≥ 10.12 | No |
Operating System | canonical | ubuntu_linux | ≥ 14.04 | No |
Application | apache | traffic_server | ≤ 6.2.3 | Yes |
Application | apache | traffic_server | ≤ 7.1.6 | Yes |
Application | apache | traffic_server | ≤ 8.0.3 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |
Application | nodejs | node.js | ≤ 8.8.1 | Yes |
Application | nodejs | node.js | < 8.16.1 | Yes |
Application | nodejs | node.js | ≤ 10.12.0 | Yes |
Application | nodejs | node.js | < 10.16.3 | Yes |
Application | nodejs | node.js | < 12.8.1 | Yes |