First published: Mon Nov 18 2019(Updated: )
An issue was discovered in Envoy 1.12.0. Upon receipt of a malformed HTTP request without a Host header, it sends an internally generated "Invalid request" response. This internally generated response is dispatched through the configured encoder filter chain before being sent to the client. An encoder filter that invokes route manager APIs that access a request's Host header causes a NULL pointer dereference, resulting in abnormal termination of the Envoy process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Proxy | <=1.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18838 is a vulnerability in Envoy, versions up to and including 1.12.0.
CVE-2019-18838 has a severity rating of 7.5 (High).
CVE-2019-18838 affects Envoy versions up to and including 1.12.1.
To fix CVE-2019-18838, update your Envoy installation to version 1.12.1 or later.
For more information about CVE-2019-18838, you can refer to the following resources: - Envoy blog: https://blog.envoyproxy.io - Envoy GitHub repository: https://github.com/envoyproxy/envoy/commits/master - Envoy security advisories: https://github.com/envoyproxy/envoy/security/advisories/GHSA-f2rv-4w6x-rwhc