CVE-2019-15226
Severity CVSS v4.0:
Pending analysis
Type:
CWE-400
Uncontrolled Resource Consumption ('Resource Exhaustion')
Publication date:
09/10/2019
Last modified:
17/10/2019
Description
Upon receiving each incoming request header data, Envoy will iterate over existing request headers to verify that the total size of the headers stays below a maximum limit. The implementation in versions 1.10.0 through 1.11.1 for HTTP/1.x traffic and all versions of Envoy for HTTP/2 traffic had O(n^2) performance characteristics. A remote attacker may craft a request that stays below the maximum request header size but consists of many thousands of small headers to consume CPU and result in a denial-of-service attack.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:envoyproxy:envoy:1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.9.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:envoyproxy:envoy:1.11.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



