CVE-2019-15225 — Allocation of Resources Without Limits or Throttling in Envoy
Severity
7.5HIGHNVD
EPSS
0.1%
top 65.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 19
Latest updateMay 24
Description
In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages1 packages
🔴Vulnerability Details
1📋Vendor Advisories
1Red Hat
▶
💬Community
1Bugzilla▶
CVE-2019-15225 envoy: crafted request with long URI allows remote attacker to cause denial of service↗2019-10-25