Description
Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.
Related CPE's
a
envoyproxy
envoy
a
pomerium
pomerium
References
https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc
https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2021-09-09T22:15:09.773
3 years agoLast modified
2021-09-27T18:30:56.377
3 years ago