Envoyproxy

Envoy

85 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.12%
  • Veröffentlicht 14.07.2020 22:15:10
  • Zuletzt bearbeitet 21.11.2024 05:04:49

In Envoy before versions 1.12.6, 1.13.4, 1.14.4, and 1.15.0 when validating TLS certificates, Envoy would incorrectly allow a wildcard DNS Subject Alternative Name apply to multiple subdomains. For example, with a SAN of *.example.com, Envoy would in...

  • EPSS 0.11%
  • Veröffentlicht 01.07.2020 15:15:15
  • Zuletzt bearbeitet 21.11.2024 05:39:13

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may exhaust file descriptors and/or memory when accepting too many connections.

  • EPSS 0.44%
  • Veröffentlicht 01.07.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:54

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.

  • EPSS 0.79%
  • Veröffentlicht 01.07.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:54

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when processing HTTP/1.1 headers with long field names or requests with long URLs.

  • EPSS 0.79%
  • Veröffentlicht 01.07.2020 14:15:14
  • Zuletzt bearbeitet 21.11.2024 04:59:54

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when proxying HTTP/2 requests or responses with many small (i.e. 1 byte) data frames.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 15.04.2020 02:15:14
  • Zuletzt bearbeitet 21.11.2024 04:58:34

Istio through 1.5.1 and Envoy through 1.14.1 have a data-leak issue. If there is a TCP connection (negotiated with SNI over HTTPS) to *.example.com, a request for a domain concurrently configured explicitly (e.g., abc.example.com) is sent to the serv...

  • EPSS 0.03%
  • Veröffentlicht 04.03.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 05:39:13

CNCF Envoy through 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched t...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 13.12.2019 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:41

An issue was discovered in Envoy 1.12.0. Upon receipt of a malformed HTTP request without a Host header, it sends an internally generated "Invalid request" response. This internally generated response is dispatched through the configured encoder filt...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 13.12.2019 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:35

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Ho...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 13.12.2019 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:35

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send HTTP/2 requests that write to the heap outside of the request buffers when the upstream is HTTP/1. This may be used to corrupt nearby heap contents (leading to a query-of-de...