Description
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Remediation
References
Related Vulnerabilities
Envoy Proxy Reachable Assertion Vulnerability (CVE-2021-29258)
WordPress Plugin Accept Stripe Donation-AidWP Security Bypass (2.8)
MySQL CVE-2016-0609 Vulnerability (CVE-2016-0609)
WordPress Plugin Elementor Addon Elements Cross-Site Request Forgery (1.6.3)
WordPress Plugin Alpine PhotoTile for Instagram Cross-Site Scripting (1.2.7.4)