CVE-2020-11080
LOWnghttp2 <1.41.0 - DoS
Title source: llmDescription
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
Scores
CVSS v3
3.7
EPSS
0.0068
EPSS Percentile
71.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Classification
CWE
CWE-400
CWE-707
Status
published
Affected Products (16)
nghttp2/nghttp2
< 1.41.0
debian/debian_linux
debian/debian_linux
opensuse/leap
fedoraproject/fedora
fedoraproject/fedora
oracle/banking_extensibility_workbench
oracle/banking_extensibility_workbench
oracle/blockchain_platform
< 21.1.2
oracle/enterprise_communications_broker
oracle/enterprise_communications_broker
oracle/graalvm
oracle/graalvm
oracle/mysql
< 7.3.30
nodejs/node.js
< 10.12.0
... and 1 more
Timeline
Published
Jun 03, 2020
Tracked Since
Feb 18, 2026