Описание
An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern. This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout. This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57. Users are recommended to upgrade to version 2.4.58, which fixes the issue.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | released | 2.4.58-1ubuntu1 |
esm-infra-legacy/trusty | not-affected | http2 support not implemented |
esm-infra/bionic | not-affected | version not vulnerable |
esm-infra/focal | not-affected | 2.4.41-4ubuntu3.14 |
esm-infra/xenial | not-affected | http2 not built |
focal | not-affected | 2.4.41-4ubuntu3.14 |
jammy | not-affected | 2.4.52-1ubuntu4.6 |
lunar | released | 2.4.55-1ubuntu2.1 |
mantic | released | 2.4.57-2ubuntu2.1 |
Показывать по
EPSS
7.5 High
CVSS3
Связанные уязвимости
An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern. This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout. This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57. Users are recommended to upgrade to version 2.4.58, which fixes the issue.
An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern. This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout. This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57. Users are recommended to upgrade to version 2.4.58, which fixes the issue.
An attacker, opening a HTTP/2 connection with an initial window size o ...
An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern. This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout. This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57. Users are recommended to upgrade to version 2.4.58, which fixes the issue.
EPSS
7.5 High
CVSS3