Search 191973 CVE descriptions
and 86218 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Huawei EulerOS Local Security Checks
Title:Huawei EulerOS: Security Advisory for nginx (EulerOS-SA-2020-2372)
Summary:The remote host is missing an update for the Huawei EulerOS; 'nginx' package(s) announced via the EulerOS-SA-2020-2372 advisory.
The remote host is missing an update for the Huawei EulerOS
'nginx' package(s) announced via the EulerOS-SA-2020-2372 advisory.

Vulnerability Insight:
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.(CVE-2019-9511)

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.(CVE-2019-9513)

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.(CVE-2019-9516)

Affected Software/OS:
'nginx' package(s) on Huawei EulerOS V2.0SP2.

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-9511
Bugtraq: 20190822 [SECURITY] [DSA 4505-1] nginx security update (Google Search)
Bugtraq: 20190902 [SECURITY] [DSA 4511-1] nghttp2 security update (Google Search)
CERT/CC vulnerability note: VU#605641
Debian Security Information: DSA-4505 (Google Search)
Debian Security Information: DSA-4511 (Google Search)
Debian Security Information: DSA-4669 (Google Search)
RedHat Security Advisories: RHSA-2019:2692
RedHat Security Advisories: RHSA-2019:2745
RedHat Security Advisories: RHSA-2019:2746
RedHat Security Advisories: RHSA-2019:2775
RedHat Security Advisories: RHSA-2019:2799
RedHat Security Advisories: RHSA-2019:2925
RedHat Security Advisories: RHSA-2019:2939
RedHat Security Advisories: RHSA-2019:2949
RedHat Security Advisories: RHSA-2019:2955
RedHat Security Advisories: RHSA-2019:2966
RedHat Security Advisories: RHSA-2019:3041
RedHat Security Advisories: RHSA-2019:3932
RedHat Security Advisories: RHSA-2019:3933
RedHat Security Advisories: RHSA-2019:3935
RedHat Security Advisories: RHSA-2019:4018
RedHat Security Advisories: RHSA-2019:4019
RedHat Security Advisories: RHSA-2019:4020
RedHat Security Advisories: RHSA-2019:4021
SuSE Security Announcement: openSUSE-SU-2019:2114 (Google Search)
SuSE Security Announcement: openSUSE-SU-2019:2115 (Google Search)
SuSE Security Announcement: openSUSE-SU-2019:2120 (Google Search)
SuSE Security Announcement: openSUSE-SU-2019:2232 (Google Search)
SuSE Security Announcement: openSUSE-SU-2019:2234 (Google Search)
SuSE Security Announcement: openSUSE-SU-2019:2264 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2019-9513
Common Vulnerability Exposure (CVE) ID: CVE-2019-9516
Bugtraq: 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0 (Google Search)
RedHat Security Advisories: RHSA-2019:2946
RedHat Security Advisories: RHSA-2019:2950
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2020 E-Soft Inc. All rights reserved.