<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE-2019-9511 Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS) in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-9511-multiple-http-2-implementations-are-vulnerable-to/m-p/282779#M627</link>
    <description>&lt;DIV class="lia-message-subject lia-component-message-view-widget-subject"&gt;&lt;SPAN style="font-family: inherit;"&gt;Hi,&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV id="bodyDisplay" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;Just wondering on expected release for signature for this Vulnerability?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;CVE-2019-9511 till CVE-2019-9518 capable of DoS attack.&amp;nbsp;Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Refer-&lt;/SPAN&gt;&lt;BR /&gt;&lt;A href="https://www.kb.cert.org/vuls/id/605641/" target="_blank" rel="noopener"&gt;https://www.kb.cert.org/vuls/id/605641/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511" target="_blank" rel="noopener"&gt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks and regards&lt;/P&gt;
&lt;P&gt;Apoorva&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 14 Aug 2019 18:48:12 GMT</pubDate>
    <dc:creator>akamat</dc:creator>
    <dc:date>2019-08-14T18:48:12Z</dc:date>
    <item>
      <title>CVE-2019-9511 Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-9511-multiple-http-2-implementations-are-vulnerable-to/m-p/282779#M627</link>
      <description>&lt;DIV class="lia-message-subject lia-component-message-view-widget-subject"&gt;&lt;SPAN style="font-family: inherit;"&gt;Hi,&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV id="bodyDisplay" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;Just wondering on expected release for signature for this Vulnerability?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;CVE-2019-9511 till CVE-2019-9518 capable of DoS attack.&amp;nbsp;Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Refer-&lt;/SPAN&gt;&lt;BR /&gt;&lt;A href="https://www.kb.cert.org/vuls/id/605641/" target="_blank" rel="noopener"&gt;https://www.kb.cert.org/vuls/id/605641/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511" target="_blank" rel="noopener"&gt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks and regards&lt;/P&gt;
&lt;P&gt;Apoorva&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 14 Aug 2019 18:48:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2019-9511-multiple-http-2-implementations-are-vulnerable-to/m-p/282779#M627</guid>
      <dc:creator>akamat</dc:creator>
      <dc:date>2019-08-14T18:48:12Z</dc:date>
    </item>
  </channel>
</rss>

