First published: Mon Apr 09 2018(Updated: )
nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nghttp2 | <1.31.1 | 1.31.1 |
Nghttp2 Nghttp2 | >=1.10.0<=1.31.0 | |
Nodejs Node.js | >=6.0.0<=6.8.1 | |
Nodejs Node.js | >=8.4.0<=8.17.0 | |
Nodejs Node.js | >=9.0.0<=9.11.2 | |
Nodejs Node.js | >=10.0.0<10.4.1 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000168 is a vulnerability in nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 that contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling.
CVE-2018-1000168 has a severity rating of 7.5 (high).
nghttp2 version >= 1.10.0 and <= v1.31.0, Node.js versions 6.0.0 to 6.8.1, 8.4.0 to 8.17.0, and 9.0.0 to 9.11.2, as well as Debian Linux version 9.0 are affected by CVE-2018-1000168.
The CVE-2018-1000168 vulnerability can be exploited through a network client.
To fix CVE-2018-1000168, you should update your nghttp2 package to version 1.31.1.