Upon receiving each incoming request header data, Envoy will iterate over existing request headers to verify that the total size of the headers stays below a maximum limit. The implementation in versions 1.10.0 through 1.11.1 for HTTP/1.x traffic and all versions of Envoy for HTTP/2 traffic had O(n^2) performance characteristics. A remote attacker may craft a request that stays below the maximum request header size but consists of many thousands of small headers to consume CPU and result in a denial-of-service attack.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T00:42:01.230Z

Reserved: 2019-08-19T00:00:00

Link: CVE-2019-15226

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-09T16:15:14.687

Modified: 2024-11-21T04:28:14.570

Link: CVE-2019-15226

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-10-08T00:00:00Z

Links: CVE-2019-15226 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses