nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2019:0367 | vendor advisory third party advisory |
https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/ | third party advisory release notes |
http://www.securityfocus.com/bid/103952 | third party advisory vdb entry broken link |
https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/ | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:0366 | vendor advisory third party advisory |
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html | third party advisory mailing list |