Back to Istio Io

ISTIO-SECURITY-2019-005

content/en/news/security/istio-security-2019-005/index.md

latest1.5 KB
Original Source

{{< security_bulletin >}}

Envoy, and subsequently Istio, are vulnerable to the following DoS attack. Upon receiving each incoming request, Envoy will iterate over the request headers to verify that the total size of the headers stays below a maximum limit. A remote attacker may craft a request that stays below the maximum request header size but consists of many thousands of small headers to consume CPU and result in a denial-of-service attack.

Impact and detection

Both Istio gateways and sidecars are vulnerable to this issue. If you are running one of the affected releases, your cluster is vulnerable.

Mitigation

{{< boilerplate "security-vulnerability" >}}