Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-8740

Опубликовано: 05 дек. 2016
Источник: debian

Описание

The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.25-1package
apache2not-affectedjessiepackage
apache2not-affectedwheezypackage

Примечания

  • HTTP/2 support introduced in 2.4.17

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 9 лет назад

The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request.

CVSS3: 5.9
redhat
около 9 лет назад

The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request.

CVSS3: 7.5
nvd
около 9 лет назад

The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request.

suse-cvrf
около 9 лет назад

Security update for apache2

suse-cvrf
около 9 лет назад

Security update for apache2