5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.012 Low
EPSS
Percentile
85.5%
Issue Overview:
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection. (CVE-2020-11080)
Affected Packages:
nghttp2
Issue Correction:
Run yum update nghttp2 to update your system.
New Packages:
i686:
libnghttp2-1.33.0-1.1.6.amzn1.i686
nghttp2-debuginfo-1.33.0-1.1.6.amzn1.i686
nghttp2-1.33.0-1.1.6.amzn1.i686
libnghttp2-devel-1.33.0-1.1.6.amzn1.i686
src:
nghttp2-1.33.0-1.1.6.amzn1.src
x86_64:
libnghttp2-devel-1.33.0-1.1.6.amzn1.x86_64
nghttp2-debuginfo-1.33.0-1.1.6.amzn1.x86_64
libnghttp2-1.33.0-1.1.6.amzn1.x86_64
nghttp2-1.33.0-1.1.6.amzn1.x86_64
Red Hat: CVE-2020-11080
Mitre: CVE-2020-11080
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | libnghttp2 | < 1.33.0-1.1.6.amzn1 | libnghttp2-1.33.0-1.1.6.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | nghttp2-debuginfo | < 1.33.0-1.1.6.amzn1 | nghttp2-debuginfo-1.33.0-1.1.6.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | nghttp2 | < 1.33.0-1.1.6.amzn1 | nghttp2-1.33.0-1.1.6.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | libnghttp2-devel | < 1.33.0-1.1.6.amzn1 | libnghttp2-devel-1.33.0-1.1.6.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | libnghttp2-devel | < 1.33.0-1.1.6.amzn1 | libnghttp2-devel-1.33.0-1.1.6.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | nghttp2-debuginfo | < 1.33.0-1.1.6.amzn1 | nghttp2-debuginfo-1.33.0-1.1.6.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | libnghttp2 | < 1.33.0-1.1.6.amzn1 | libnghttp2-1.33.0-1.1.6.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | nghttp2 | < 1.33.0-1.1.6.amzn1 | nghttp2-1.33.0-1.1.6.amzn1.x86_64.rpm |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.012 Low
EPSS
Percentile
85.5%