CVE-2019-15225Allocation of Resources Without Limits or Throttling in Envoy

Severity
7.5HIGHNVD
EPSS
0.1%
top 65.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 19
Latest updateMay 24

Description

In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

NVDenvoyproxy/envoy1.11.1

🔴Vulnerability Details

1
GHSA
GHSA-fgr2-cr98-vm44: In Envoy through 12022-05-24

📋Vendor Advisories

1
Red Hat
envoy: crafted request with long URI allows remote attacker to cause denial of service2019-08-19

💬Community

1
Bugzilla
CVE-2019-15225 envoy: crafted request with long URI allows remote attacker to cause denial of service2019-10-25
CVE-2019-15225 — Envoyproxy Envoy vulnerability | cvebase