First published: Mon Aug 19 2019(Updated: )
In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Proxy | <=1.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15225 is a vulnerability in Envoy through 1.11.1 that allows a remote attacker to cause a denial of service attack by sending a request with a very long URI, resulting in excessive memory consumption.
CVE-2019-15225 affects users of Envoy through version 1.11.1.
CVE-2019-15225 has a severity rating of 7.5 (high).
An attacker can exploit CVE-2019-15225 by sending a request with a long URI, causing excessive memory consumption and resulting in a denial of service attack.
Yes, users should upgrade to a version of Envoy later than 1.11.1 to mitigate the CVE-2019-15225 vulnerability.