HTTP2: Apache Traffic Server HTTP2 Settings Flood Denial of Service

This signature detects attempts to exploit a known vulnerability against Apache Traffic Server. A successful attack can result in a denial-of-service condition.

Extended Description

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

Affected Products

Nodejs node.js

Short Name
HTTP2:APACHE-SETTING-DNS
Severity
Major
Recommended
False
Recommended Action
None
Category
HTTP2
Keywords
Apache CVE-2019-9515 Denial Flood HTTP2 Server Service Settings Traffic of
Release Date
11/28/2019
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

Sigpack Version
3590
False Positive
Rarely
Vendors

Oracle

F5

Redhat

Nodejs

Fedoraproject

Synology

Opensuse

Mcafee

Apache

Debian

Canonical

CVSS Score

7.8

Found a potential security threat?