Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-10081

Опубликовано: 15 авг. 2019
Источник: debian
EPSS Средний

Описание

HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.41-1package
apache2not-affectedjessiepackage

Примечания

  • Affects upstream versions 2.4.20 to 2.4.39

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-10081

EPSS

Процентиль: 96%
0.26679
Средний

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.

CVSS3: 5.3
redhat
почти 6 лет назад

HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.

CVSS3: 7.5
nvd
почти 6 лет назад

HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.

CVSS3: 7.5
github
около 3 лет назад

HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.

CVSS3: 7.5
fstec
почти 6 лет назад

Уязвимость реализации сетевого протокола HTTP/2 веб-сервера Apache HTTP Server, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 96%
0.26679
Средний