Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2020-8659
CNCF Envoy through 1.13.0 may consume excessive amounts of memory when proxying HTTP/1.1 requests or responses with many small (i.e. 1 byte) chunks.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.002
EPSS Ranking
45.3%
CVSS Severity
CVSS v3 Score
7.5
CVSS v2 Score
5.0
References
https://access.redhat.com/errata/RHSA-2020:0734
https://github.com/envoyproxy/envoy/security/advisories/GHSA-jwcm-4pwp-c2qv
https://lists.debian.org/debian-lts-announce/2022/05/msg00025.html
https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history
https://access.redhat.com/errata/RHSA-2020:0734
https://github.com/envoyproxy/envoy/security/advisories/GHSA-jwcm-4pwp-c2qv
https://lists.debian.org/debian-lts-announce/2022/05/msg00025.html
https://www.envoyproxy.io/docs/envoy/v1.13.1/intro/version_history
Products affected by CVE-2020-8659
Cncf
»
Envoy
»
Version:
1.13.0
cpe:2.3:a:cncf:envoy:1.13.0
Redhat
»
Openshift Service Mesh
»
Version:
1.0
cpe:2.3:a:redhat:openshift_service_mesh:1.0
Debian
»
Debian Linux
»
Version:
9.0
cpe:2.3:o:debian:debian_linux:9.0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved