content/en/news/security/istio-security-2019-004/index.md
{{< security_bulletin >}}
Envoy, and subsequently Istio are vulnerable to a series of trivial HTTP/2-based DoS attacks:
RST_STREAM frames that results in unbounded memory growth (which can lead to out of memory conditions).Those vulnerabilities were reported externally and affect multiple proxy implementations. See this security bulletin for more information.
If Istio terminates externally originated HTTP then it is vulnerable. If Istio is instead fronted by an intermediary that terminates HTTP (e.g., a HTTP load balancer), then that intermediary would protect Istio, assuming the intermediary is not itself vulnerable to the same HTTP/2 exploits.
{{< boilerplate "security-vulnerability" >}}