[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2023-2322 --- httpd

ID: oval:org.secpod.oval:def:1701916Date: (C)2023-11-24   (M)2024-04-25
Class: PATCHFamily: unix




Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57. A flaw was found in httpd. This flaw allows an attacker opening an HTTP/2 connection with an initial window size of 0 to block handling of that connection indefinitely in the Apache HTTP Server. This vulnerability can exhaust worker resources in the server, similar to the well-known "slow loris" attack pattern. DescriptionA flaw was found in mod_http2. When a HTTP/2 stream is reset by a client, there is a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open, causing the memory footprint to keep on growing. On connection close, all resources are reclaimed but the process might run out of memory before connection close.StatementDuring "normal" HTTP/2 use, the probability of encountering this issue is very low. The kept memory would not become noticeable before the connection closes or times out.MitigationMitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability

Platform:
Amazon Linux 2
Product:
httpd
mod_ssl
mod_md
mod_proxy_html
mod_ldap
mod_session
Reference:
ALAS2-2023-2322
CVE-2023-31122
CVE-2023-43622
CVE-2023-45802
CVE    3
CVE-2023-31122
CVE-2023-45802
CVE-2023-43622
CPE    7
cpe:/a:apache:http_server
cpe:/a:apache:mod_proxy_html
cpe:/a:apache:mod_session
cpe:/o:amazon:linux:2
...

© SecPod Technologies