VID |
22796 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the version of Apache 2.4.x installed on the remote host is a version prior to 2.4.26. It is, therefore, affected by the following vulnerability :
When under stress, closing many connections, the HTTP/2 handling code in Apache httpd 2.4.26 would sometimes access memory after it has been freed, resulting in potentially erratic behaviour.
* References: https://lists.apache.org/thread.html/9d0098775bd83cf7c33ac5a077ef412c14ce939198921e639c734e20@%3Cannounce.httpd.apache.org%3E
https://httpd.apache.org/security/vulnerabilities_24.html
* Platforms Affected: Apache HTTP versions 2.4.x prior to 2.4.26
Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache HTTP Server (2.4.26 or later), available from the Apache Software Foundation download site, http://httpd.apache.org/download.cgi |
Related URL |
CVE-2017-9789 (CVE) |
Related URL |
99568 (SecurityFocus) |
Related URL |
(ISS) |
|