CVE-2020-11080

LOW

nghttp2 <1.41.0 - DoS

Title source: llm

Description

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.

Scores

CVSS v3 3.7
EPSS 0.0068
EPSS Percentile 71.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

Classification

CWE
CWE-400 CWE-707
Status published

Affected Products (16)

nghttp2/nghttp2 < 1.41.0
debian/debian_linux
debian/debian_linux
opensuse/leap
fedoraproject/fedora
fedoraproject/fedora
oracle/banking_extensibility_workbench
oracle/banking_extensibility_workbench
oracle/blockchain_platform < 21.1.2
oracle/enterprise_communications_broker
oracle/enterprise_communications_broker
oracle/graalvm
oracle/graalvm
oracle/mysql < 7.3.30
nodejs/node.js < 10.12.0
... and 1 more

Timeline

Published Jun 03, 2020
Tracked Since Feb 18, 2026