CVE-2019-9517 (CNNVD-201908-943)
HIGH
中文标题:
HTTP/2 资源管理错误漏洞
英文标题:
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service
CVSS分数:
7.5
发布时间:
2019-08-13 20:50:59
漏洞类型:
资源管理错误
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
HTTP/2是超文本传输协议的第二版,主要用于保证客户机与服务器之间的通信。 HTTP/2中存在资源管理错误漏洞。攻击者可利用该漏洞导致拒绝服务。
英文描述:
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.
CWE类型:
CWE-400
CWE-770
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| apple | swiftnio | * | - | - |
cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*
|
| apache | http_server | * | - | - |
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
|
| apache | traffic_server | * | - | - |
cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 16.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
|
| canonical | ubuntu_linux | 18.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
|
| canonical | ubuntu_linux | 19.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 10.0 | - | - |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
| synology | skynas | - | - | - |
cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*
|
| synology | diskstation_manager | 6.2 | - | - |
cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*
|
| synology | vs960hd_firmware | - | - | - |
cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 29 | - | - |
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 30 | - | - |
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
|
| opensuse | leap | 15.0 | - | - |
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
|
| opensuse | leap | 15.1 | - | - |
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
|
| redhat | jboss_core_services | 1.0 | - | - |
cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
|
| redhat | jboss_enterprise_application_platform | 7.2.0 | - | - |
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*
|
| redhat | jboss_enterprise_application_platform | 7.3.0 | - | - |
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*
|
| redhat | openshift_service_mesh | 1.0 | - | - |
cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*
|
| redhat | quay | 3.0.0 | - | - |
cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*
|
| redhat | software_collections | 1.0 | - | - |
cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 8.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
|
| oracle | communications_element_manager | 8.0.0 | - | - |
cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*
|
| oracle | communications_element_manager | 8.1.0 | - | - |
cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*
|
| oracle | communications_element_manager | 8.1.1 | - | - |
cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
|
| oracle | communications_element_manager | 8.2.0 | - | - |
cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
|
| oracle | graalvm | 19.2.0 | - | - |
cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*
|
| oracle | instantis_enterprisetrack | * | - | - |
cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
|
| oracle | retail_xstore_point_of_service | 7.1 | - | - |
cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
|
| mcafee | web_gateway | * | - | - |
cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
|
| netapp | clustered_data_ontap | - | - | - |
cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
|
| nodejs | node.js | * | - | - |
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
VU#605641
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
[httpd-announce] 20190814 CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[oss-security] 20190814 CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers
mailing-list
cve.org
访问
cve.org
[httpd-dev] 20190817 CVE-2019-10097 vs. CHANGEs entry
mailing-list
cve.org
访问
cve.org
[httpd-dev] 20190817 Re: CVE-2019-10097 vs. CHANGEs entry
mailing-list
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
FEDORA-2019-5a6a7bc12c
vendor-advisory
cve.org
访问
cve.org
FEDORA-2019-6a2980de56
vendor-advisory
cve.org
访问
cve.org
DSA-4509
vendor-advisory
cve.org
访问
cve.org
20190826 [SECURITY] [DSA 4509-1] apache2 security update
mailing-list
cve.org
访问
cve.org
USN-4113-1
vendor-advisory
cve.org
访问
cve.org
FEDORA-2019-4427fd65be
vendor-advisory
cve.org
访问
cve.org
FEDORA-2019-63ba15cc83
vendor-advisory
cve.org
访问
cve.org
openSUSE-SU-2019:2051
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
GLSA-201909-04
vendor-advisory
cve.org
访问
cve.org
openSUSE-SU-2019:2114
vendor-advisory
cve.org
访问
cve.org
openSUSE-SU-2019:2115
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
RHSA-2019:2893
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2925
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2939
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2946
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2950
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2949
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2955
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
RHSA-2019:3933
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:3935
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:3932
vendor-advisory
cve.org
访问
cve.org
[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
CVSS评分详情
3.0 (cna)
HIGH
7.5
CVSS向量:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2019-08-13 20:50:59
修改时间:
2024-08-04 21:54:44
创建时间:
2025-11-11 15:35:53
更新时间:
2025-11-11 15:54:52
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2019-9517 |
2025-11-11 15:20:17 | 2025-11-11 07:35:53 |
| NVD | nvd_CVE-2019-9517 |
2025-11-11 14:56:25 | 2025-11-11 07:44:22 |
| CNNVD | cnnvd_CNNVD-201908-943 |
2025-11-11 15:10:15 | 2025-11-11 07:54:52 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:54:52
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-201908-943; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 资源管理错误
- cnnvd_id: 未提取 -> CNNVD-201908-943
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:44:22
affected_products_count: 0 → 32; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 0 -> 32
- data_sources: ['cve'] -> ['cve', 'nvd']