Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-9490

Опубликовано: 07 авг. 2020
Источник: redhat
CVSS3: 7.5
EPSS Высокий

Описание

Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.

A flaw was found in Apache httpd in versions prior to 2.4.46. A specially crafted Cache-Digest header triggers negative argument to memmove() that could lead to a crash and denial of service. The highest threat from this vulnerability is to system availability.

Отчет

As per upstream this flaw only affects Apache HTTP Server versions 2.4.20 to 2.4.43. Therefore only httpd packages shipped with Red Hat Enterprise Linux 8 are affected.

Меры по смягчению последствий

Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5httpdNot affected
Red Hat Enterprise Linux 6httpdNot affected
Red Hat Enterprise Linux 7httpdNot affected
Red Hat JBoss Core ServiceshttpdNot affected
Red Hat JBoss Enterprise Web Server 2httpdOut of support scope
Red Hat Enterprise Linux 8httpdFixedRHSA-2020:371410.09.2020
Red Hat Enterprise Linux 8.0 Update Services for SAP SolutionshttpdFixedRHSA-2020:373414.09.2020
Red Hat Enterprise Linux 8.1 Extended Update SupporthttpdFixedRHSA-2020:372611.09.2020
Red Hat Software Collections for Red Hat Enterprise Linux 6httpd24-httpdFixedRHSA-2020:373314.09.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7httpd24-httpdFixedRHSA-2020:373314.09.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1866560httpd: Push diary crash on specifically crafted HTTP/2 header

EPSS

Процентиль: 99%
0.76276
Высокий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.

CVSS3: 7.5
nvd
больше 5 лет назад

Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.

CVSS3: 7.5
msrc
больше 5 лет назад

Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.

CVSS3: 7.5
debian
больше 5 лет назад

Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted valu ...

CVSS3: 7.5
github
больше 3 лет назад

Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.

EPSS

Процентиль: 99%
0.76276
Высокий

7.5 High

CVSS3