Логотип exploitDog
bind: "CVE-2024-24814"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-24814"

Количество 11

Количество 11

ubuntu логотип

CVE-2024-24814

больше 1 года назад

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_chunks cookie value makes the server vulnerable to a denial of service (DoS) attack. An internal security audit has been conducted and the reviewers found that if they manipulated the value of the mod_auth_openidc_session_chunks cookie to a very large integer, like 99999999, the server struggles with the request for a long time and finally gets back with a 500 error. Making a few requests of this kind caused our server to become unresponsive. Attackers can craft requests that would make the server work very hard (and possibly become unresponsive) and/or crash with minimal effort. This issue has been addressed in version 2.4.15.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2024-24814

больше 1 года назад

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_chunks cookie value makes the server vulnerable to a denial of service (DoS) attack. An internal security audit has been conducted and the reviewers found that if they manipulated the value of the mod_auth_openidc_session_chunks cookie to a very large integer, like 99999999, the server struggles with the request for a long time and finally gets back with a 500 error. Making a few requests of this kind caused our server to become unresponsive. Attackers can craft requests that would make the server work very hard (and possibly become unresponsive) and/or crash with minimal effort. This issue has been addressed in version 2.4.15.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2024-24814

больше 1 года назад

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_chunks cookie value makes the server vulnerable to a denial of service (DoS) attack. An internal security audit has been conducted and the reviewers found that if they manipulated the value of the mod_auth_openidc_session_chunks cookie to a very large integer, like 99999999, the server struggles with the request for a long time and finally gets back with a 500 error. Making a few requests of this kind caused our server to become unresponsive. Attackers can craft requests that would make the server work very hard (and possibly become unresponsive) and/or crash with minimal effort. This issue has been addressed in version 2.4.15.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-24814

больше 1 года назад

mod_auth_openidc is an OpenID Certified\u2122 authentication and autho ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2299-1

12 месяцев назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0758-1

больше 1 года назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0757-1

больше 1 года назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
oracle-oval логотип

ELSA-2024-9180

8 месяцев назад

ELSA-2024-9180: mod_auth_openidc security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-5289

11 месяцев назад

ELSA-2024-5289: mod_auth_openidc:2.3 security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2024-02794

больше 1 года назад

Уязвимость модуля аутентификации и авторизации для Apache 2.x HTTP server Mod_auth_openidc, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20240815-16

11 месяцев назад

Уязвимость mod_auth_openidc

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-24814

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_chunks cookie value makes the server vulnerable to a denial of service (DoS) attack. An internal security audit has been conducted and the reviewers found that if they manipulated the value of the mod_auth_openidc_session_chunks cookie to a very large integer, like 99999999, the server struggles with the request for a long time and finally gets back with a 500 error. Making a few requests of this kind caused our server to become unresponsive. Attackers can craft requests that would make the server work very hard (and possibly become unresponsive) and/or crash with minimal effort. This issue has been addressed in version 2.4.15.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-24814

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_chunks cookie value makes the server vulnerable to a denial of service (DoS) attack. An internal security audit has been conducted and the reviewers found that if they manipulated the value of the mod_auth_openidc_session_chunks cookie to a very large integer, like 99999999, the server struggles with the request for a long time and finally gets back with a 500 error. Making a few requests of this kind caused our server to become unresponsive. Attackers can craft requests that would make the server work very hard (and possibly become unresponsive) and/or crash with minimal effort. This issue has been addressed in version 2.4.15.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-24814

mod_auth_openidc is an OpenID Certified™ authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_chunks cookie value makes the server vulnerable to a denial of service (DoS) attack. An internal security audit has been conducted and the reviewers found that if they manipulated the value of the mod_auth_openidc_session_chunks cookie to a very large integer, like 99999999, the server struggles with the request for a long time and finally gets back with a 500 error. Making a few requests of this kind caused our server to become unresponsive. Attackers can craft requests that would make the server work very hard (and possibly become unresponsive) and/or crash with minimal effort. This issue has been addressed in version 2.4.15.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-24814

mod_auth_openidc is an OpenID Certified\u2122 authentication and autho ...

CVSS3: 7.5
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2299-1

Security update for apache2-mod_auth_openidc

0%
Низкий
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:0758-1

Security update for apache2-mod_auth_openidc

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0757-1

Security update for apache2-mod_auth_openidc

0%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-9180

ELSA-2024-9180: mod_auth_openidc security update (MODERATE)

8 месяцев назад
oracle-oval логотип
ELSA-2024-5289

ELSA-2024-5289: mod_auth_openidc:2.3 security update (MODERATE)

11 месяцев назад
fstec логотип
BDU:2024-02794

Уязвимость модуля аутентификации и авторизации для Apache 2.x HTTP server Mod_auth_openidc, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 1 года назад
redos логотип
ROS-20240815-16

Уязвимость mod_auth_openidc

CVSS3: 7.5
0%
Низкий
11 месяцев назад

Уязвимостей на страницу