Miggo Logo

CVE-2019-9514: golang.org/x/net/http vulnerable to a reset flood

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.9151%
Published
5/24/2022
Updated
5/20/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
golang.org/x/netgo< 0.0.0-20190813141303-74dc4d7220e70.0.0-20190813141303-74dc4d7220e7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis is based on the provided commit and the description of the vulnerability. The functions identified are directly related to the handling of HTTP/2 connections and streams, and the patch modifies these functions to limit the number of control frames in the send queue.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Som* *TTP/* impl*m*nt*tions *r* vuln*r**l* to * r*s*t *loo*, pot*nti*lly l***in* to * **ni*l o* s*rvi**. S*rv*rs t**t ****pt *ir**t *onn**tions *rom untrust** *li*nts *oul* ** r*mot*ly m*** to *llo**t* *n unlimit** *mount o* m*mory, until t** pro*r*m

Reasoning

T** *n*lysis is **s** on t** provi*** *ommit *n* t** **s*ription o* t** vuln*r**ility. T** *un*tions i**nti*i** *r* *ir**tly r*l*t** to t** **n*lin* o* *TTP/* *onn**tions *n* str**ms, *n* t** p*t** mo*i*i*s t**s* *un*tions to limit t** num**r o* *ont