Vulnerability Details : CVE-2018-1000168
nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1.
Vulnerability category: Memory CorruptionInput validationDenial of service
Products affected by CVE-2018-1000168
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
- cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
- cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
- cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-1000168
6.71%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-1000168
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2018-1000168
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-1000168
-
https://access.redhat.com/errata/RHSA-2019:0367
RHSA-2019:0367 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:0366
RHSA-2019:0366 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securityfocus.com/bid/103952
nghttp2 CVE-2018-1000168 Remote Denial of Service VulnerabilityBroken Link;Third Party Advisory;VDB Entry
-
https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/
June 2018 Security Releases | Node.jsRelease Notes;Third Party Advisory
-
https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/
Nghttp2 v1.31.1 - nghttp2.orgVendor Advisory
-
https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html
[SECURITY] [DLA 2786-1] nghttp2 security updateMailing List;Third Party Advisory
Jump to