Download
| Alert*
oval:org.secpod.oval:def:509185
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix: httpd: mod_http2: CONTINUATION frames DoS For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CV ... oval:org.secpod.oval:def:1702260 HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion oval:org.secpod.oval:def:708872 apache2: Apache HTTP server Several security issues were fixed in Apache HTTP Server. oval:org.secpod.oval:def:2600543 The mod_h2 Apache httpd module implements the HTTP2 protocol on top of libnghttp2 for httpd 2.4 servers. oval:org.secpod.oval:def:613057 Multiple vulnerabilities have been discovered in the Apache HTTP server, which may result in HTTP response splitting or denial of service. oval:org.secpod.oval:def:99579 apache2: Apache HTTP server Several security issues were fixed in Apache HTTP Server. oval:org.secpod.oval:def:509202 The mod_h2 Apache httpd module implements the HTTP2 protocol on top of libnghttp2 for httpd 2.4 servers. Security Fix: httpd: CONTINUATION frames DoS For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page ... oval:org.secpod.oval:def:99001 The host is installed with Apache HTTP Server through 2.4.58 and is prone to an uncontrolled resource consumption vulnerability. A flaw is present in the application, which fails to properly handle a HTTP/2 incoming headers exceeding the limit. Successful exploitation could allows attackers to cause ... oval:org.secpod.oval:def:1507468 [1.15.19-5.1] - Resolves: RHEL-29826 - mod_http2: httpd: CONTINUATION frames DoS oval:org.secpod.oval:def:1507502 [2.0.26-2] - Resolves: RHEL-31855 - mod_http2: httpd: CONTINUATION frames DoS [2.0.26-1] - Resolves: RHEL-14691 - mod_http2 rebase to 2.0.26 oval:org.secpod.oval:def:1507463 httpd mod_http2 [1.15.7-8.5] - Resolves: RHEL-29816 - httpd:2.4/mod_http2: httpd: CONTINUATION frames DoS mod_md oval:org.secpod.oval:def:127533 The mod_h2 Apache httpd module implements the HTTP2 protocol on top of libnghttp2 for httpd 2.4 servers. oval:org.secpod.oval:def:127531 The mod_h2 Apache httpd module implements the HTTP2 protocol on top of libnghttp2 for httpd 2.4 servers. oval:org.secpod.oval:def:2501373 The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. oval:org.secpod.oval:def:1601900 HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion oval:org.secpod.oval:def:99995 Multiple vulnerabilities have been discovered in the Apache HTTP server, which may result in HTTP response splitting or denial of service. |