[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2020-1418 --- httpd24, mod24_session

ID: oval:org.secpod.oval:def:1601193Date: (C)2020-09-21   (M)2024-05-06
Class: PATCHFamily: unix




Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the "Cache-Digest" header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers. A flaw was found in Apache httpd in versions prior to 2.4.46. A specially crafted Cache-Digest header triggers negative argument to memmove that could lead to a crash and denial of service. The highest threat from this vulnerability is to system availability. Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers

Platform:
Amazon Linux AMI
Product:
httpd24
mod24_session
Reference:
ALAS-2020-1418
CVE-2020-11984
CVE-2020-11993
CVE-2020-9490
CVE    3
CVE-2020-11984
CVE-2020-11993
CVE-2020-9490

© SecPod Technologies