Vulnerability Details CVE-2019-15225
In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 35.7%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2019-15225
-
cpe:2.3:a:envoyproxy:envoy:-
-
cpe:2.3:a:envoyproxy:envoy:1.0.0
-
cpe:2.3:a:envoyproxy:envoy:1.1.0
-
cpe:2.3:a:envoyproxy:envoy:1.10.0
-
cpe:2.3:a:envoyproxy:envoy:1.11.0
-
cpe:2.3:a:envoyproxy:envoy:1.11.1
-
cpe:2.3:a:envoyproxy:envoy:1.2.0
-
cpe:2.3:a:envoyproxy:envoy:1.3.0
-
cpe:2.3:a:envoyproxy:envoy:1.4.0
-
cpe:2.3:a:envoyproxy:envoy:1.5.0
-
cpe:2.3:a:envoyproxy:envoy:1.6.0
-
cpe:2.3:a:envoyproxy:envoy:1.7.0
-
cpe:2.3:a:envoyproxy:envoy:1.7.1
-
cpe:2.3:a:envoyproxy:envoy:1.8.0
-
cpe:2.3:a:envoyproxy:envoy:1.9.0
-
cpe:2.3:a:envoyproxy:envoy:1.9.1