Description
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Remediation
References
Related Vulnerabilities
Oracle Application Server Other Vulnerability (CVE-2007-2121)
WordPress Plugin Clone Cross-Site Scripting (2.1.1)
WordPress Plugin RSVPMaker Cross-Site Scripting (2.5.4)
WordPress 2.5 Cookie Integrity Protection Unauthorized Access Vulnerability (0.6.2 - 2.5)
WordPress Plugin WP Simple Spreadsheet Fetcher for Google Cross-Site Request Forgery (0.3.6)