Executive Summary

Informations
Name CVE-2021-39162 First vendor Publication 2021-09-09
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event. This can lead to a DoS in the presence of untrusted *upstream* servers. 0.15.1 contains an upgraded envoy binary with this vulnerability patched. If only trusted upstreams are configured, there is not substantial risk of this condition being triggered.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39162

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 26
Application 1

Sources (Detail)

https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8
https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv
https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2024-11-28 14:00:11
  • Multiple Updates
2021-09-27 21:23:29
  • Multiple Updates
2021-09-10 17:22:50
  • Multiple Updates
2021-09-10 05:22:52
  • First insertion