ID |
CVE-2016-8740
|
Summary |
The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:apache:http_server:2.4.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.22:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:http_server:2.4.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.21:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
|
CVSS |
Base: | 5.0 (as of 06-06-2021 - 11:15) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-399 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
redhat
via4
|
advisories | | rpms | - httpd24-httpd-0:2.4.25-9.el6
- httpd24-httpd-0:2.4.25-9.el7
- httpd24-httpd-debuginfo-0:2.4.25-9.el6
- httpd24-httpd-debuginfo-0:2.4.25-9.el7
- httpd24-httpd-devel-0:2.4.25-9.el6
- httpd24-httpd-devel-0:2.4.25-9.el7
- httpd24-httpd-manual-0:2.4.25-9.el6
- httpd24-httpd-manual-0:2.4.25-9.el7
- httpd24-httpd-tools-0:2.4.25-9.el6
- httpd24-httpd-tools-0:2.4.25-9.el7
- httpd24-mod_ldap-0:2.4.25-9.el6
- httpd24-mod_ldap-0:2.4.25-9.el7
- httpd24-mod_proxy_html-1:2.4.25-9.el6
- httpd24-mod_proxy_html-1:2.4.25-9.el7
- httpd24-mod_session-0:2.4.25-9.el6
- httpd24-mod_session-0:2.4.25-9.el7
- httpd24-mod_ssl-1:2.4.25-9.el6
- httpd24-mod_ssl-1:2.4.25-9.el7
- jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7
- jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7
- jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7
- jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7
- jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7
- jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7
- jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7
- jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7
- jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7
- jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7
- jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7
- jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7
- jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7
- jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7
- jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7
- jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7
- jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7
- jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7
- jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7
- jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6
- jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6
- jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6
- jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6
- jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6
- jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6
- jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6
- jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6
- jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6
- jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6
- jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6
- jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6
- jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6
- jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6
- jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6
- jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6
- jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6
- jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6
- jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6
|
|
refmap
via4
|
bid | 94650 | confirm | | exploit-db | 40909 | gentoo | GLSA-201701-36 | misc | http://packetstormsecurity.com/files/140023/Apache-HTTPD-Web-Server-2.4.23-Memory-Exhaustion.html | mlist | - [httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
- [httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
- [httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
- [httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
| sectrack | 1037388 |
|
Last major update |
06-06-2021 - 11:15 |
Published |
05-12-2016 - 19:59 |
Last modified |
06-06-2021 - 11:15 |