Step 1: Payload Delivery: An attacker crafts a malicious HTTP/2 request. This request contains either a large number of headers/trailers, extremely large headers/trailers, or malformed headers/trailers.
Step 2: Request Processing: The vulnerable Proxygen library receives and begins to parse the malicious HTTP/2 request.
Step 3: Resource Exhaustion: Due to the parsing flaw, the library attempts to allocate excessive resources (memory, CPU) to process the malformed headers/trailers.
Step 4: Denial of Service: The excessive resource consumption leads to a denial-of-service condition, either by crashing the server process, exhausting available memory, or causing the server to become unresponsive to legitimate requests.