Description
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.
Remediation
References
Related Vulnerabilities
WordPress Plugin WP Events Calendar 'event_id' Parameter SQL Injection (6.5.2)
Apache HTTP Server Other Vulnerability (CVE-2000-0913)
WordPress Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-14028)
WordPress Plugin Advanced AJAX Page Loader Cross-Site Request Forgery (2.7.7)
WordPress Plugin Travelpayouts:All Travel Brands in One Place Cross-Site Request Forgery (1.0.16)