BIT-node-2020-11080

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/node/BIT-node-2020-11080.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-node-2020-11080
Aliases
Published
2024-03-06T11:08:52.092Z
Modified
2025-01-17T15:26:01.971Z
Summary
[none]
Details

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2onframerecvcallback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

Database specific
{
    "cpes": [
        "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
        "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*"
    ],
    "severity": "Low"
}
References

Affected packages

Bitnami / node

Package

Name
node
Purl
pkg:bitnami/node

Severity

  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
10.13.0
Fixed
10.21.0
Introduced
12.13.0
Fixed
12.18.0
Type
SEMVER
Events
Introduced
10.0.0
Last affected
10.12.0
Introduced
12.0.0
Last affected
12.12.0
Introduced
14.0.0
Last affected
14.4.0