Vulnerability identifier: #VU11858
Vulnerability risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-1000168
CWE-ID:
CWE-476
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
nghttp2
Universal components / Libraries /
Libraries used by multiple products
Vendor: nghttp2
Description
The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.
The weakness exists due to improper bounds checking. If an alternative services (ALTSVC) frame is too large, the pointer field that points to the ALTSVC frame payload is left NULL. A remote attacker can submit a large ALTSVC frame, trigger a NULL pointer dereference and cause the service to crash.
Mitigation
Update to version 1.31.1.
Vulnerable software versions
nghttp2: 1.10.0 - 1.31.0
External links
https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.