CVE Vulnerabilities

CVE-2020-11080

Improper Neutralization

Published: Jun 03, 2020 | Modified: Nov 07, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

Weakness

The product does not ensure or incorrectly ensures that structured messages or data are well-formed and that certain security properties are met before being read from an upstream component or sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Nghttp2 Nghttp2 * 1.41.0 (excluding)
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6 *
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6 *
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6 *
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6 *
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6 *
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6 *
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6 *
JBoss Core Services on RHEL 6 RedHat jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7 *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7 *
OpenShift Service Mesh 1.0 RedHat servicemesh-proxy-0:1.0.10-3.el8 *
OpenShift Service Mesh 1.1 RedHat servicemesh-proxy-0:1.1.2-3.el8 *
Red Hat Enterprise Linux 8 RedHat nodejs:10-8020020200617141353.4cda2c84 *
Red Hat Enterprise Linux 8 RedHat nodejs:12-8020020200630155331.4cda2c84 *
Red Hat Enterprise Linux 8 RedHat nghttp2-0:1.33.0-3.el8_2.1 *
Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions RedHat nodejs:10-8000020200617115915.f8e95b4e *
Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions RedHat nghttp2-0:1.33.0-1.el8_0.2 *
Red Hat Enterprise Linux 8.1 Extended Update Support RedHat nodejs:12-8010020200630154708.c27ad7f8 *
Red Hat Enterprise Linux 8.1 Extended Update Support RedHat nodejs:10-8010020200617134056.c27ad7f8 *
Red Hat Enterprise Linux 8.1 Extended Update Support RedHat nghttp2-0:1.33.0-3.el8_1.1 *
Red Hat JBoss Core Services 1 RedHat nghttp2 *
Red Hat Software Collections for Red Hat Enterprise Linux 6 RedHat httpd24-nghttp2-0:1.7.1-8.el6.1 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat httpd24-nghttp2-0:1.7.1-8.el7.1 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-nodejs12-nodejs-0:12.18.2-1.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-nodejs10-nodejs-0:10.21.0-3.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS RedHat httpd24-nghttp2-0:1.7.1-8.el7.1 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS RedHat rh-nodejs12-nodejs-0:12.18.2-1.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS RedHat rh-nodejs10-nodejs-0:10.21.0-3.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS RedHat httpd24-nghttp2-0:1.7.1-8.el7.1 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS RedHat rh-nodejs12-nodejs-0:12.18.2-1.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS RedHat rh-nodejs10-nodejs-0:10.21.0-3.el7 *
Nghttp2 Ubuntu bionic *
Nghttp2 Ubuntu esm-apps/xenial *
Nghttp2 Ubuntu esm-infra/bionic *
Nghttp2 Ubuntu focal *
Nghttp2 Ubuntu trusty *
Nghttp2 Ubuntu xenial *
Nodejs Ubuntu bionic *
Nodejs Ubuntu eoan *
Nodejs Ubuntu groovy *
Nodejs Ubuntu hirsute *
Nodejs Ubuntu impish *
Nodejs Ubuntu mantic *
Nodejs Ubuntu trusty *
Nodejs Ubuntu xenial *

Extended Description

If a message is malformed, it may cause the message to be incorrectly interpreted. Neutralization is an abstract term for any technique that ensures that input (and output) conforms with expectations and is “safe.” This can be done by:

This weakness typically applies in cases where the product prepares a control message that another process must act on, such as a command or query, and malicious input that was intended as data, can enter the control plane instead. However, this weakness also applies to more general cases where there are not always control implications.

References