VID |
22872 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the version of Apache 2.4 installed on the remote host is a version prior to 2.4.35. It is, therefore, affected by the following vulnerability:
- By sending continuous SETTINGS frames of maximum size an ongoing HTTP/2 connection could be kept busy and would never time out. This can be abused for a DoS on the server. This only affect a server that has enabled the h2 protocol.
* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: https://archive.apache.org/dist/httpd/CHANGES_2.4.35 https://httpd.apache.org/security/vulnerabilities_24.html#2.4.35
* Platforms Affected: Apache HTTP versions 2.4.x prior to 2.4.35 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache HTTP Server (2.4.35 or later), available from the Apache Software Foundation download site, http://httpd.apache.org/download.cgi |
Related URL |
CVE-2018-11763 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|