CVE-2019-16770

In Puma before versions 3.12.2 and 4.3.1, a poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. This vulnerability is patched in Puma 4.3.1 and 3.12.2.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
GitHub_MCNA
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 56%
VendorProductVersion
pumapuma
3.0.0 ≤
𝑥
< 3.12.2
pumapuma
4.0.0 ≤
𝑥
< 4.3.1
debiandebian_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
puma
bullseye
4.3.8-1+deb11u2
fixed
bullseye (security)
4.3.8-1+deb11u3
fixed
bookworm
5.6.5-3
fixed
sid
6.4.2-6
fixed
trixie
6.4.2-6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
puma
focal
not-affected
eoan
ignored
disco
ignored
bionic
dne
xenial
dne
trusty
dne