Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-0196

Опубликовано: 11 июн. 2019
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.38-3package
apache2not-affectedjessiepackage

Примечания

  • HTTP/2 support introduced in 2.4.17

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0196

  • https://svn.apache.org/r1852989

EPSS

Процентиль: 92%
0.08201
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 6 лет назад

A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.

CVSS3: 5.3
redhat
около 6 лет назад

A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.

CVSS3: 5.3
nvd
около 6 лет назад

A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.

github
около 3 лет назад

A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.

CVSS3: 5.3
fstec
около 6 лет назад

Уязвимость модуля mod_http2 веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или получить доступ к конфиденциальной информации

EPSS

Процентиль: 92%
0.08201
Низкий