Executive Summary

Summary
Title nghttp2: Denial of Service
Informations
Name GLSA-201612-13 First vendor Publication 2016-12-05
Vendor Gentoo Last vendor Modification 2016-12-05
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

Nghttp2 is vulnerable to a Denial of Service attack.

Background

Nghttp2 is an implementation of HTTP/2 and its header compression algorithm HPACK in C.

Description

Nghttpd, nghttp, and libnghttp2_asio applications do not limit the memory usage for the incoming HTTP header field. If a peer sends a specially crafted HTTP/2 HEADERS frame and CONTINUATION frame, they will crash with an out of memory error.

Impact

A remote attacker could possibly cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All nghttp2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/nghttp2-1.7.1"

References

[ 1 ] CVE-2016-1544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1544

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201612-13

Original Source

Url : http://security.gentoo.org/glsa/glsa-201612-13.xml

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2016-12-06 13:26:15
  • Multiple Updates
2016-12-05 05:22:08
  • First insertion