[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2019-1166

ID: oval:org.secpod.oval:def:1600980Date: (C)2019-05-30   (M)2024-01-29
Class: PATCHFamily: unix




A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request that would cause mod_ssl to enter a loop leading to a denial of service. This bug can be only triggered with Apache HTTP Server version 2.4.37 when using OpenSSL version 1.1.1 or later, due to an interaction in changes to handling of renegotiation attempts. In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 connections. In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded

Platform:
Amazon Linux AMI
Product:
httpd24
mod24_session
Reference:
ALAS-2019-1166
CVE-2018-17199
CVE-2018-17189
CVE-2019-0190
CVE    3
CVE-2018-17199
CVE-2018-17189
CVE-2019-0190
CPE    2
cpe:/o:amazon:linux
cpe:/a:apache:httpd24

© SecPod Technologies