Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Upon receiving each incoming request header data, Envoy will iterate over existing request headers to verify that the total size of the headers stays below a maximum limit. The implementation in versions 1.10.0 through 1.11.1 for HTTP/1.x traffic and all versions of Envoy for HTTP/2 traffic had O(n^2) performance characteristics. A remote attacker may craft a request that stays below the maximum request header size but consists of many thousands of small headers to consume CPU and result in a denial-of-service attack.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Envoy 资源管理错误漏洞
Vulnerability Description
Envoy是一款开源的分布式代理服务器。 Envoy 1.10.0版本至1.11.1版本中存在资源管理错误漏洞。攻击者可借助特制请求利用该漏洞造成拒绝服务(消耗CPU资源)。
CVSS Information
N/A
Vulnerability Type
N/A