VID |
22895 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.38. It is, therefore, affected by multiple vulnerabilities:
- A denial of service (DoS) vulnerability exists in HTTP/2 steam handling. An unauthenticated, remote attacker can exploit this issue, via sending request bodies in a slow loris way to plain resources, to occupy a server thread. (CVE-2018-17189)
- A vulnerability exists in mod_sesion_cookie, as it does not properly check the expiry time of cookies. (CVE-2018-17199)
- A denial of service (DoS) vulnerability exists in mod_ssl when used with OpenSSL 1.1.1 due to an interaction in changes to handling of renegotiation attempts. An unauthenticated, remote attacker can exploit this issue to cause mod_ssl to stop responding. (CVE-2019-0190)
* References: https://archive.apache.org/dist/httpd/CHANGES_2.4.38 https://httpd.apache.org/security/vulnerabilities_24.html#2.4.38
* Platforms Affected: Apache HTTP versions 2.4.x prior to 2.4.38 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache HTTP Server (2.4.38 or later), available from the Apache Software Foundation download site, http://httpd.apache.org/download.cgi |
Related URL |
CVE-2018-17189,CVE-2018-17199,CVE-2019-0190 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|