CVE-2020-12604Missing Release of Memory after Effective Lifetime in Envoy

Severity
7.5HIGHNVD
EPSS
0.4%
top 36.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
Latest updateJun 30
PublishedJul 1

Description

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

NVDenvoyproxy/envoy1.12.4+2

Patches

📋Vendor Advisories

1
Red Hat
envoy: Resource exhaustion via HTTP/2 client requests with large payloads and improper stream windows2020-06-30

💬Community

1
Bugzilla
CVE-2020-12604 envoy: Resource exhaustion via HTTP/2 client requests with large payloads and improper stream windows2020-06-04
CVE-2020-12604 — Envoyproxy Envoy vulnerability | cvebase