CVE-2018-16844
nginx: Excessive CPU usage via flaw in HTTP/2 implementation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.
nginx en versiones anteriores a la 1.15.6 y 1.14.1 tiene una vulnerabilidad en la implementación de HTTP/2 que puede permitir el uso excesivo de CPU. Este problema afecta a nginx compilado con ngx_http_v2_module (no compilado por defecto) si la opción "hppt2" de la directiva "listen" se emplea en un archivo de configuración.
It was discovered that nginx incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to cause excessive memory consumption, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 18.10. Gal Goldshtein discovered that nginx incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to cause excessive CPU usage, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 18.10. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-09-11 CVE Reserved
- 2018-11-07 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://seclists.org/fulldisclosure/2021/Sep/36 | Mailing List |
|
http://www.securityfocus.com/bid/105868 | Third Party Advisory | |
http://www.securitytracker.com/id/1042038 | Third Party Advisory | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16844 | Issue Tracking | |
https://support.apple.com/kb/HT212818 | Third Party Advisory |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html | 2022-02-22 | |
http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.html | 2022-02-22 | |
https://access.redhat.com/errata/RHSA-2018:3680 | 2022-02-22 | |
https://access.redhat.com/errata/RHSA-2018:3681 | 2022-02-22 | |
https://usn.ubuntu.com/3812-1 | 2022-02-22 | |
https://www.debian.org/security/2018/dsa-4335 | 2022-02-22 | |
https://access.redhat.com/security/cve/CVE-2018-16844 | 2018-11-27 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1644510 | 2018-11-27 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
F5 Search vendor "F5" | Nginx Search vendor "F5" for product "Nginx" | >= 1.9.5 < 1.14.1 Search vendor "F5" for product "Nginx" and version " >= 1.9.5 < 1.14.1" | - |
Affected
| ||||||
F5 Search vendor "F5" | Nginx Search vendor "F5" for product "Nginx" | >= 1.15.0 < 1.15.6 Search vendor "F5" for product "Nginx" and version " >= 1.15.0 < 1.15.6" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.10" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Xcode Search vendor "Apple" for product "Xcode" | < 13.0 Search vendor "Apple" for product "Xcode" and version " < 13.0" | - |
Affected
|