CVE-2019-18836
- EPSS 0.16%
- Published 11.11.2019 01:15:10
- Last modified 21.11.2024 04:33:40
Envoy 1.12.0 allows a remote denial of service because of resource loops, as demonstrated by a single idle TCP connection being able to keep a worker thread in an infinite busy loop when continue_on_listener_filters_timeout is used."
CVE-2019-15226
- EPSS 13.1%
- Published 09.10.2019 16:15:14
- Last modified 21.11.2024 04:28:14
Upon receiving each incoming request header data, Envoy will iterate over existing request headers to verify that the total size of the headers stays below a maximum limit. The implementation in versions 1.10.0 through 1.11.1 for HTTP/1.x traffic and...
CVE-2019-15225
- EPSS 0.15%
- Published 19.08.2019 23:15:10
- Last modified 21.11.2024 04:28:14
In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). ...
- EPSS 0.1%
- Published 25.04.2019 16:29:01
- Last modified 21.11.2024 04:52:32
Envoy 1.9.0 and before does not normalize HTTP URL paths. A remote attacker may craft a relative path, e.g., something/../admin, to bypass access control, e.g., a block on /admin. A backend server could then interpret the non-normalized path and prov...
CVE-2019-9900
- EPSS 0.04%
- Published 25.04.2019 15:29:01
- Last modified 21.11.2024 04:52:32
When parsing HTTP/1.x header values, Envoy 1.9.0 and before does not reject embedded zero characters (NUL, ASCII 0x0). This allows remote attackers crafting header values containing embedded NUL characters to potentially bypass header matching rules,...