You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 15 Next »

Summary

This table lists vendors and products affected by a set of vulnerabilities in multiple HTTP/2 implementations. For more information see VU#605641, NFLX-2019-002, and vendor-specific references in the table.

For feedback on this matrix, send mail to cert@cert.org with VU#605641 in the subject.

Matrix

Not affected

VendorProduct

Version Information

Data Dribble
CVE-2019-9511

Ping Flood
CVE-2019-9512

Resource Loop
CVE-2019-9513

Reset Flood
CVE-2019-9514

Settings Flood
CVE-2019-9515

0-Length Headers Leak
CVE-2019-9516

Internal Data Buffering
CVE-2019-9517

Empty Frames Flood
CVE-2019-9518

ApacheApache HTTP Server2.4.38NNN
NNY
ApacheTomcat9.0.13 (using FreeBSD native library 1.2.16)NN

Affected*

https://markmail.org/message/konb64olyan5ye6t

* just a little

NNN

ApacheTraffic Server
NYNYYNN
EnvoyEnvoyPrior to 1.11.1Not affected

Affected

https://groups.google.com/forum/#!topic/envoy-announce/ZLchtraPYVk

Affected

https://groups.google.com/forum/#!topic/envoy-announce/ZLchtraPYVk

Affected

https://groups.google.com/forum/#!topic/envoy-announce/ZLchtraPYVk

Affected

https://groups.google.com/forum/#!topic/envoy-announce/ZLchtraPYVk

Not affectedNot affected

Affected

https://groups.google.com/forum/#!topic/envoy-announce/ZLchtraPYVk

F5NGINX

1.9.5 - 1.17.2

Affected

Fixed in 1.61.1 and 1.17.3

http://mailman.nginx.org/pipermail/nginx-announce/2019/000249.html

Not affected

Affected

Fixed in 1.61.1 and 1.17.3

http://mailman.nginx.org/pipermail/nginx-announce/2019/000249.html

Not affectedNot affected

Affected

Fixed in 1.61.1 and 1.17.3

http://mailman.nginx.org/pipermail/nginx-announce/2019/000249.html

Not affectedNot affected






















GoogleGoPrior to 1.11.13 and 1.12.8NYNot affectedYNot affectedNNot affectedNot affected
GooglegRPC C1.21.0Not affectedNot affectedNot affectedYYNNot affected?
GooglegRPC Java

1.21.0

Uses Netty

Not affectedNot affectedNot affectedYNNot affected?
GooglegRPC Go1.21.0Not affectedNot affectedNot affectedYYNot affectedNot affected
H2O ProjectH2OFixed in 2.2.6 and 2.3.0 beta2Not affected

Affected

https://github.com/h2o/h2o/issues/2090

Not affected

Affected

https://github.com/h2o/h2o/issues/2090

Affected

https://github.com/h2o/h2o/issues/2090

Not affectedNot affectedNot affected
HyperHyper: HTTP/2 for Pythonhttps://python-hyper.org/en/latest/security.htmlNot affectedNot affectedNot affectedNot affectedNot affectedNot affectedNot affectedNot affected
IstioIstio

Fixed in 1.1.13 and 1.2.4

Uses Envoy

Not affected

Affected

ISTIO-SECURITY-2019-004

https://istio.io/blog/2019/istio-security-003-004/

Affected

ISTIO-SECURITY-2019-004

https://istio.io/blog/2019/istio-security-003-004/

Affected

ISTIO-SECURITY-2019-004

https://istio.io/blog/2019/istio-security-003-004/

Affected

ISTIO-SECURITY-2019-004

https://istio.io/blog/2019/istio-security-003-004/

Not affectedNot affected

Affected

ISTIO-SECURITY-2019-004

https://istio.io/blog/2019/istio-security-003-004/

Microsoft

Windows

Internet Information Server (IIS)

Windows 10

Windows Server 2016 and 2019

Windows Server, version 1803 and version 1903

Affected

https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-9511

Affected

https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-9512

Affected

https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-9513

Affected

https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-9514
Not affectedNot affectedN

Affected

https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-9518

Netty ProjectNetty4.1.27Not affected

Affected

https://netty.io/news/2019/08/13/4-1-39-Final.html

Not affected

Affected

https://netty.io/news/2019/08/13/4-1-39-Final.html

Affected

https://netty.io/news/2019/08/13/4-1-39-Final.html
Not affectedNot affected

Affected

https://netty.io/news/2019/08/13/4-1-39-Final.html
nghttp2

YNYNNNN
Node.js ProjectNode.js8, 10, and 12

Affected

https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/

Not affected

Affected

https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/

Affected

https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/

Not affected?Not affected?
proxygen

NYYYYNN

Swift

SwiftNIO HTTP/2 (swift-nio-http2)

1.0.0 and 1.4.0 inclusive

Not affected

Affected

https://forums.swift.org/t/swiftnio-http-2-security-notice/27855

Not affected

Affected

https://forums.swift.org/t/swiftnio-http-2-security-notice/27855

Affected

https://forums.swift.org/t/swiftnio-http-2-security-notice/27855

Affected

https://forums.swift.org/t/swiftnio-http-2-security-notice/27855

Not affected

Affected

https://forums.swift.org/t/swiftnio-http-2-security-notice/27855

Twisted  16.3.0, 16.3.1, 16.3.2, 16.4.0, 16.4.1, 16.5.0, 16.6.0, 17.1.0, 17.5.0, 17.9.0, 18.4.0, 18.7.0, 18.9.0, 19.2.0, 19.2.1, 19.7.0

NYNYNNN?

Other References

https://blog.cloudflare.com/on-the-recent-http-2-dos-attacks/

https://blogs.akamai.com/sitr/2019/08/http2-vulnerabilities.html


  • No labels