CVE-2020-15104
- EPSS 0.12%
- Veröffentlicht 14.07.2020 22:15:10
- Zuletzt bearbeitet 21.11.2024 05:04:49
In Envoy before versions 1.12.6, 1.13.4, 1.14.4, and 1.15.0 when validating TLS certificates, Envoy would incorrectly allow a wildcard DNS Subject Alternative Name apply to multiple subdomains. For example, with a SAN of *.example.com, Envoy would in...
CVE-2020-8663
- EPSS 0.11%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 21.11.2024 05:39:13
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may exhaust file descriptors and/or memory when accepting too many connections.
CVE-2020-12604
- EPSS 0.44%
- Veröffentlicht 01.07.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 04:59:54
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.
CVE-2020-12605
- EPSS 0.79%
- Veröffentlicht 01.07.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 04:59:54
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when processing HTTP/1.1 headers with long field names or requests with long URLs.
CVE-2020-12603
- EPSS 0.79%
- Veröffentlicht 01.07.2020 14:15:14
- Zuletzt bearbeitet 21.11.2024 04:59:54
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when proxying HTTP/2 requests or responses with many small (i.e. 1 byte) data frames.
CVE-2020-11767
- EPSS 0.09%
- Veröffentlicht 15.04.2020 02:15:14
- Zuletzt bearbeitet 21.11.2024 04:58:34
Istio through 1.5.1 and Envoy through 1.14.1 have a data-leak issue. If there is a TCP connection (negotiated with SNI over HTTPS) to *.example.com, a request for a domain concurrently configured explicitly (e.g., abc.example.com) is sent to the serv...
CVE-2020-8660
- EPSS 0.03%
- Veröffentlicht 04.03.2020 22:15:11
- Zuletzt bearbeitet 21.11.2024 05:39:13
CNCF Envoy through 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched t...
CVE-2019-18838
- EPSS 0.1%
- Veröffentlicht 13.12.2019 13:15:11
- Zuletzt bearbeitet 21.11.2024 04:33:41
An issue was discovered in Envoy 1.12.0. Upon receipt of a malformed HTTP request without a Host header, it sends an internally generated "Invalid request" response. This internally generated response is dispatched through the configured encoder filt...
CVE-2019-18802
- EPSS 0.05%
- Veröffentlicht 13.12.2019 13:15:11
- Zuletzt bearbeitet 21.11.2024 04:33:35
An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Ho...
CVE-2019-18801
- EPSS 0.04%
- Veröffentlicht 13.12.2019 13:15:11
- Zuletzt bearbeitet 21.11.2024 04:33:35
An issue was discovered in Envoy 1.12.0. An untrusted remote client may send HTTP/2 requests that write to the heap outside of the request buffers when the upstream is HTTP/1. This may be used to corrupt nearby heap contents (leading to a query-of-de...