High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2018-16843
HighVulnerability Description
nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Known Affected Software
89 configuration(s) from 4 vendor(s)
cpe:2.3:a:apple:xcode:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:7.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:7.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.6:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:7.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:8.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:5.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:11.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.6.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:6.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:11.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:6.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:9.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:6.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:7.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:6.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:10:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:11.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:8.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:6.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:12.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:12.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:9.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:12.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:6.2:beta_2:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:9.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:8.3.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:8.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:9.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:5.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:9.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:6.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:8.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:xcode:12.4:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
References & Resources
-
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.htmlsecalert@redhat.com Mailing List Third Party Advisory
-
http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.htmlsecalert@redhat.com Mailing List Vendor Advisory
-
http://seclists.org/fulldisclosure/2021/Sep/36secalert@redhat.com Mailing List Third Party Advisory
-
http://www.securityfocus.com/bid/105868secalert@redhat.com Third Party Advisory VDB Entry
-
http://www.securitytracker.com/id/1042038secalert@redhat.com Third Party Advisory VDB Entry
-
https://access.redhat.com/errata/RHSA-2018:3653secalert@redhat.com Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:3680secalert@redhat.com Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:3681secalert@redhat.com Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16843secalert@redhat.com Issue Tracking Third Party Advisory
-
https://support.apple.com/kb/HT212818secalert@redhat.com Third Party Advisory
-
https://usn.ubuntu.com/3812-1/secalert@redhat.com Third Party Advisory
-
https://www.debian.org/security/2018/dsa-4335secalert@redhat.com Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Vendor Advisory
-
http://seclists.org/fulldisclosure/2021/Sep/36af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.securityfocus.com/bid/105868af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
http://www.securitytracker.com/id/1042038af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
https://access.redhat.com/errata/RHSA-2018:3653af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:3680af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:3681af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16843af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Third Party Advisory
-
https://support.apple.com/kb/HT212818af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://usn.ubuntu.com/3812-1/af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://www.debian.org/security/2018/dsa-4335af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
Severity Details
Weakness Type (CWE)
Uncontrolled Resource Consumption
- Description
- The product does not properly control the allocation and maintenance of a limited resource.
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Class
Key Information
- Published Date
- November 07, 2018
