ID CVE-2018-1333
Summary By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.18-2.4.30,2.4.33).
References
Vulnerable Configurations
  • Apache Software Foundation Apache HTTP Server 2.4.18
    cpe:2.3:a:apache:http_server:2.4.18
  • Apache Software Foundation HTTP Server 2.4.19
    cpe:2.3:a:apache:http_server:2.4.19
  • Apache Software Foundation HTTP Server 2.4.20
    cpe:2.3:a:apache:http_server:2.4.20
  • Apache Software Foundation Apache HTTP Server 2.4.21
    cpe:2.3:a:apache:http_server:2.4.21
  • Apache Software Foundation Apache HTTP Server 2.4.22
    cpe:2.3:a:apache:http_server:2.4.22
  • Apache Software Foundation HTTP Server 2.4.23
    cpe:2.3:a:apache:http_server:2.4.23
  • Apache Software Foundation HTTP Server 2.4.24
    cpe:2.3:a:apache:http_server:2.4.24
  • Apache Software Foundation Apache HTTP Server 2.4.25
    cpe:2.3:a:apache:http_server:2.4.25
  • Apache Software Foundation Apache HTTP Server 2.4.26
    cpe:2.3:a:apache:http_server:2.4.26
  • Apache Software Foundation Apache HTTP Server 2.4.27
    cpe:2.3:a:apache:http_server:2.4.27
  • Apache Software Foundation Apache HTTP Server 2.4.28
    cpe:2.3:a:apache:http_server:2.4.28
  • Apache Software Foundation Apache HTTP Server 2.4.29
    cpe:2.3:a:apache:http_server:2.4.29
  • Apache Software Foundation HTTP Server 2.4.30
    cpe:2.3:a:apache:http_server:2.4.30
  • Apache Software Foundation Apache HTTP Server 2.4.33
    cpe:2.3:a:apache:http_server:2.4.33
  • Red Hat JBoss Core Services 1.0
    cpe:2.3:a:redhat:jboss_core_services:1.0
  • Red Hat Enterprise Linux 6.0
    cpe:2.3:o:redhat:enterprise_linux:6.0
  • Red Hat Enterprise Linux (RHEL) 7.0 (7)
    cpe:2.3:o:redhat:enterprise_linux:7.0
  • Canonical Ubuntu Linux 18.04 LTS Edition
    cpe:2.3:o:canonical:ubuntu_linux:18.04:-:-:-:lts
  • cpe:2.3:a:netapp:cloud_backup
    cpe:2.3:a:netapp:cloud_backup
  • cpe:2.3:a:netapp:storage_automation_store
    cpe:2.3:a:netapp:storage_automation_store
CVSS
Base: 5.0
Impact:
Exploitability:
CWE CWE-399
CAPEC
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-893.NASL
    description This update for apache2 fixes the following issues : The following security vulnerability were fixed : - CVE-2018-1333: Fixed a worker exhaustion that could have lead to a denial of service via specially crafted HTTP/2 requests (bsc#1101689). This update was imported from the SUSE:SLE-12-SP2:Update update project.
    last seen 2019-02-21
    modified 2018-10-04
    plugin id 112002
    published 2018-08-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=112002
    title openSUSE Security Update : apache2 (openSUSE-2018-893)
  • NASL family PhotonOS Local Security Checks
    NASL id PHOTONOS_PHSA-2018-2_0-0089_HTTPD.NASL
    description An update of the httpd package has been released.
    last seen 2019-02-08
    modified 2019-02-07
    plugin id 121991
    published 2019-02-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121991
    title Photon OS 2.0: Httpd PHSA-2018-2.0-0089
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3783-1.NASL
    description Robert Swiecki discovered that the Apache HTTP Server HTTP/2 module incorrectly destroyed certain streams. A remote attacker could possibly use this issue to cause the server to crash, leading to a denial of service. (CVE-2018-1302) Craig Young discovered that the Apache HTTP Server HTTP/2 module incorrectly handled certain requests. A remote attacker could possibly use this issue to cause the server to consume resources, leading to a denial of service. (CVE-2018-1333) Gal Goldshtein discovered that the Apache HTTP Server HTTP/2 module incorrectly handled large SETTINGS frames. A remote attacker could possibly use this issue to cause the server to consume resources, leading to a denial of service. (CVE-2018-11763). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-24
    plugin id 117916
    published 2018-10-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117916
    title Ubuntu 18.04 LTS : apache2 vulnerabilities (USN-3783-1)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_8B1A50AB8A8E11E8ADD2B499BAEBFEAF.NASL
    description The Apache project reports : - DoS for HTTP/2 connections by crafted requests (CVE-2018-1333). By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. (low) - mod_md, DoS via Coredumps on specially crafted requests (CVE-2018-8011). By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server. (moderate)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 111177
    published 2018-07-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111177
    title FreeBSD : Apache httpd -- multiple vulnerabilities (8b1a50ab-8a8e-11e8-add2-b499baebfeaf)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-2424-1.NASL
    description This update for apache2 fixes the following issues: The following security vulnerabilities were fixed : - CVE-2018-1333: Fixed a worker exhaustion that could have lead to a denial of service via specially crafted HTTP/2 requests (bsc#1101689). - CVE-2018-8011: Fixed a NULL pointer dereference in mod_md, which could have lead to a denial of service via specially crafted HTTP requests (bsc#1101688). Note: We are currently not shipping this modules, since it is still considered experimental, but we might start to ship it with future releases. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 120085
    published 2019-01-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=120085
    title SUSE SLES15 Security Update : apache2 (SUSE-SU-2018:2424-1)
  • NASL family PhotonOS Local Security Checks
    NASL id PHOTONOS_PHSA-2018-2_0-0089.NASL
    description An update of 'httpd' packages of Photon OS has been released.
    last seen 2019-02-08
    modified 2019-02-07
    plugin id 117399
    published 2018-09-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117399
    title Photon OS 2.0: Httpd PHSA-2018-2.0-0089 (deprecated)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2019-0367.NASL
    description An update is now available for JBoss Core Services on RHEL 6 and RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section. Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.29 Service Pack 1 serves as an update to Red Hat JBoss Core Services Apache HTTP Server 2.4.29, and includes bug fixes for CVEs which are linked to in the References section. Security Fixes : * httpd: DoS for HTTP/2 connections by continuous SETTINGS (CVE-2018-11763) * httpd: Weak Digest auth nonce generation in mod_auth_digest (CVE-2018-1312) * httpd: Out of bound access after failure in reading the HTTP request (CVE-2018-1301) * httpd: Use-after-free on HTTP/2 stream shutdown (CVE-2018-1302) * httpd: bypass with a trailing newline in the file name (CVE-2017-15715) * httpd: Out of bound write in mod_authnz_ldap when using too small Accept-Language values (CVE-2017-15710) * httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause a denial of service (CVE-2018-1303) * httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications (CVE-2018-1283) * httpd: mod_http2: too much time allocated to workers, possibly leading to DoS (CVE-2018-1333) * mod_jk: connector path traversal due to mishandled HTTP requests in httpd (CVE-2018-11759) * nghttp2: NULL pointer dereference when too large ALTSVC frame is received (CVE-2018-1000168) * openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service (CVE-2018-0739) Details around each issue, including information about the CVE, severity of the issue, and the CVSS score, can be found on the CVE pages listed in the Reference section below.
    last seen 2019-02-21
    modified 2019-02-19
    plugin id 122292
    published 2019-02-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=122292
    title RHEL 6 / 7 : Red Hat JBoss Core Services Apache HTTP Server 2.4.29 (RHSA-2019:0367)
  • NASL family PhotonOS Local Security Checks
    NASL id PHOTONOS_PHSA-2018-1_0-0181_HTTPD.NASL
    description An update of the httpd package has been released.
    last seen 2019-02-08
    modified 2019-02-07
    plugin id 121885
    published 2019-02-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121885
    title Photon OS 1.0: Httpd PHSA-2018-1.0-0181
  • NASL family PhotonOS Local Security Checks
    NASL id PHOTONOS_PHSA-2018-1_0-0181.NASL
    description An update of 'httpd' packages of Photon OS has been released.
    last seen 2019-02-08
    modified 2019-02-07
    plugin id 117336
    published 2018-09-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=117336
    title Photon OS 1.0: Httpd PHSA-2018-1.0-0181 (deprecated)
  • NASL family Web Servers
    NASL id APACHE_2_4_34.NASL
    description According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.34. It is, therefore, affected by the following vulnerabilities: - By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. (CVE-2018-1333) - By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server. (CVE-2018-8011) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-12-13
    plugin id 111788
    published 2018-08-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111788
    title Apache 2.4.x < 2.4.34 Multiple Vulnerabilities
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2018-199-01.NASL
    description New httpd packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
    last seen 2018-10-05
    modified 2018-10-04
    plugin id 111185
    published 2018-07-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111185
    title Slackware 14.0 / 14.1 / 14.2 / current : httpd (SSA:2018-199-01)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-907.NASL
    description This update for apache2 fixes the following issues : The following security vulnerabilities were fixed : - CVE-2018-1333: Fixed a worker exhaustion that could have lead to a denial of service via specially crafted HTTP/2 requests (bsc#1101689). - CVE-2018-8011: Fixed a NULL pointer dereference in mod_md, which could have lead to a denial of service via specially crafted HTTP requests (bsc#1101688). Note: We are currently not shipping this modules, since it is still considered experimental, but we might start to ship it with future releases. This update was imported from the SUSE:SLE-15:Update update project.
    last seen 2019-02-21
    modified 2018-10-04
    plugin id 112006
    published 2018-08-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=112006
    title openSUSE Security Update : apache2 (openSUSE-2018-907)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-2336-1.NASL
    description This update for apache2 fixes the following issues: The following security vulnerability were fixed : - CVE-2018-1333: Fixed a worker exhaustion that could have lead to a denial of service via specially crafted HTTP/2 requests (bsc#1101689). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 111784
    published 2018-08-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111784
    title SUSE SLES12 Security Update : apache2 (SUSE-SU-2018:2336-1)
redhat via4
advisories
  • rhsa
    id RHSA-2018:3558
  • rhsa
    id RHSA-2019:0366
  • rhsa
    id RHSA-2019:0367
refmap via4
confirm
sectrack 1041402
ubuntu USN-3783-1
Last major update 18-06-2018 - 14:29
Published 18-06-2018 - 14:29
Last modified 07-05-2019 - 09:54
Back to Top