vulnerability
Apache HTTPD: mod_http2, memory corruption on early pushes (CVE-2019-10081)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | 2019-08-15 | 2019-08-16 | 2024-12-09 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
2019-08-15
Added
2019-08-16
Modified
2024-12-09
Description
HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.
Solution
apache-httpd-upgrade-latest
References
- URL-http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html
- URL-https://httpd.apache.org/security/vulnerabilities_24.html
- URL-https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
- URL-https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
- URL-https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
- URL-https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
- URL-https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
- URL-https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
- URL-https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
- URL-https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
- URL-https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
- URL-https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
- URL-https://seclists.org/bugtraq/2019/Aug/47
- URL-https://security.gentoo.org/glsa/201909-04
- URL-https://security.netapp.com/advisory/ntap-20190905-0003/
- URL-https://support.f5.com/csp/article/K84341091?utm_source=f5support&%3Butm_medium=RSS
- URL-https://usn.ubuntu.com/4113-1/
- URL-https://www.debian.org/security/2019/dsa-4509
- URL-https://www.oracle.com/security-alerts/cpuapr2020.html
- URL-https://www.oracle.com/security-alerts/cpujul2020.html
- URL-https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- CVE-2019-10081
- https://attackerkb.com/topics/CVE-2019-10081

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.