CVE-2019-9518 (CNNVD-201908-940)
HIGH
中文标题:
HTTP/2 资源管理错误漏洞
英文标题:
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service
CVSS分数:
7.5
发布时间:
2019-08-13 20:50:59
漏洞类型:
资源管理错误
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
HTTP/2是超文本传输协议的第二版,主要用于保证客户机与服务器之间的通信。 HTTP/2中存在资源管理错误漏洞。攻击者可利用该漏洞导致拒绝服务。
英文描述:
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
CWE类型:
CWE-400
CWE-770
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| apple | swiftnio | * | - | - |
cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*
|
| apache | traffic_server | * | - | - |
cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 16.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
|
| canonical | ubuntu_linux | 18.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
|
| canonical | ubuntu_linux | 19.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 10.0 | - | - |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
| synology | skynas | - | - | - |
cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*
|
| synology | diskstation_manager | 6.2 | - | - |
cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*
|
| synology | vs960hd_firmware | - | - | - |
cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 29 | - | - |
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 30 | - | - |
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
|
| opensuse | leap | 15.0 | - | - |
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
|
| opensuse | leap | 15.1 | - | - |
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
|
| redhat | jboss_core_services | 1.0 | - | - |
cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
|
| redhat | jboss_enterprise_application_platform | 7.2.0 | - | - |
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*
|
| redhat | jboss_enterprise_application_platform | 7.3.0 | - | - |
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*
|
| redhat | openshift_service_mesh | 1.0 | - | - |
cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*
|
| redhat | quay | 3.0.0 | - | - |
cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*
|
| redhat | software_collections | 1.0 | - | - |
cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 8.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
|
| oracle | graalvm | 19.2.0 | - | - |
cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*
|
| mcafee | web_gateway | * | - | - |
cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
|
| nodejs | node.js | * | - | - |
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
VU#605641
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
mailing-list
cve.org
访问
cve.org
20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
mailing-list
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
[trafficserver-announce] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames
mailing-list
cve.org
访问
cve.org
[trafficserver-users] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames
mailing-list
cve.org
访问
cve.org
[trafficserver-dev] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames
mailing-list
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
FEDORA-2019-5a6a7bc12c
vendor-advisory
cve.org
访问
cve.org
FEDORA-2019-6a2980de56
vendor-advisory
cve.org
访问
cve.org
DSA-4520
vendor-advisory
cve.org
访问
cve.org
20190910 [SECURITY] [DSA 4520-1] trafficserver security update
mailing-list
cve.org
访问
cve.org
openSUSE-SU-2019:2114
vendor-advisory
cve.org
访问
cve.org
openSUSE-SU-2019:2115
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
RHSA-2019:2925
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2939
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2955
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
RHSA-2019:3892
vendor-advisory
cve.org
访问
cve.org
[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities
mailing-list
cve.org
访问
cve.org
RHSA-2019:4352
vendor-advisory
cve.org
访问
cve.org
RHSA-2020:0727
vendor-advisory
cve.org
访问
cve.org
[cassandra-commits] 20210526 [jira] [Created] (CASSANDRA-16698) Security vulnerability CVE-2019-9518 for Netty
mailing-list
cve.org
访问
cve.org
[cassandra-commits] 20210526 [jira] [Updated] (CASSANDRA-16698) Security vulnerability CVE-2019-9518 for Netty
mailing-list
cve.org
访问
cve.org
CVSS评分详情
3.0 (cna)
HIGH
7.5
CVSS向量:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2019-08-13 20:50:59
修改时间:
2024-08-04 21:54:44
创建时间:
2025-11-11 15:35:53
更新时间:
2025-11-11 15:54:52
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2019-9518 |
2025-11-11 15:20:17 | 2025-11-11 07:35:53 |
| NVD | nvd_CVE-2019-9518 |
2025-11-11 14:56:25 | 2025-11-11 07:44:22 |
| CNNVD | cnnvd_CNNVD-201908-940 |
2025-11-11 15:10:15 | 2025-11-11 07:54:52 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:54:52
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-201908-940; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 资源管理错误
- cnnvd_id: 未提取 -> CNNVD-201908-940
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:44:22
affected_products_count: 0 → 24; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 0 -> 24
- data_sources: ['cve'] -> ['cve', 'nvd']