apache traffic-server CVE-2019-9515 vulnerability in Apache and Other Products
Published on August 13, 2019

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service

product logo product logo product logo product logo product logo product logo product logo product logo product logo product logo product logo
Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

Github Repository Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD

Weakness Type

What is a Resource Exhaustion Vulnerability?

The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

CVE-2019-9515 has been classified to as a Resource Exhaustion vulnerability or weakness.


Products Associated with CVE-2019-9515

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2019-9515 are published in these products:

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Vulnerable Packages

The following package name and versions may be associated with CVE-2019-9515

Package Manager Vulnerable Package Versions Fixed In
pip twisted < 19.10.0 19.10.0

Exploit Probability

EPSS
10.39%
Percentile
93.12%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.