|
|
Subscribe / Log in / New account

nghttp2: denial of service

Package(s):nghttp2 CVE #(s):CVE-2016-1544
Created:February 15, 2016 Updated:December 5, 2016
Description: From the Arch Linux advisory:

HTTP/2 uses HPACK to compress header fields. The basic idea is that HTTP header field is stored in the receiver with the numeric index number. The memory used by this storage is tightly constrained, and it is 4KiB by default. When sender sends the same header field, it just sends the corresponding numeric index number, which is usually 1 or 2 bytes. This means that after sender makes the receiver store the relatively large header field (e.g., 4KiB), and it can send specially crafted HEADERS/CONTINUATION frames which contain a lot of references to the stored header field, sender easily effectively send lots of big header fields to the receiver quite easily. nghttpd, nghttp, and libnghttp2_asio applications do not limit the memory usage for received header fields, so if the peer performs the procedure described above, they will crash due to out of memory.

A remote attacker can cause an application using nghttp2 to allocate a lot of memory by sending specially crafted HTTP/2 frames, causing a denial of service.

Alerts:
openSUSE openSUSE-SU-2016:0675-1 nghttp2 2016-03-07
Gentoo 201612-13 nghttp2 2016-12-05
Fedora FEDORA-2016-3d9efe44d8 nghttp2 2016-02-22
Fedora FEDORA-2016-ac861a840e nghttp2 2016-02-17
Arch Linux ASA-201602-13 nghttp2 2016-02-13

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds