[SECURITY-L] CVE's para Apache sobre exaustão de recursos no protocolo HTTP

CSIRT Unicamp security em unicamp.br
Quinta Abril 4 11:17:43 -03 2024


[oss-security] CVE-2023-38709: Apache HTTP Server: HTTP response splitting
Eric Covener covener em apache.org por  lists.openwall.com
para oss-security
Affected versions:

- Apache HTTP Server through 2.4.58

Description:

Faulty input validation in the core of Apache allows malicious or
exploitable backend/content generators to split HTTP responses.

This issue affects Apache HTTP Server: through 2.4.58.

Credit:

Orange Tsai (@orange_8361) from DEVCORE (finder)

References:

https://httpd.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-38709

[oss-security] CVE-2024-27316: Apache HTTP Server: HTTP/2 DoS by memory
exhaustion on endless continuation frames
Eric Covener covener em apache.org por  lists.openwall.com

para oss-security
Severity: moderate

Affected versions:

- Apache HTTP Server 2.4.17 through 2.4.58

Description:

HTTP/2 incoming headers exceeding the limit are temporarily buffered in
nghttp2 in order to generate an informative HTTP 413 response. If a client
does not stop sending headers, this leads to memory exhaustion.

Credit:

Bartek Nowotarski (https://nowotarski.info/)  (finder)

References:

https://httpd.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-27316

[oss-security] CVE-2024-24795: Apache HTTP Server: HTTP Response Splitting
in multiple modules
Eric Covener covener em apache.org por  lists.openwall.com

para oss-security
Severity: low

Affected versions:

- Apache HTTP Server 2.4.0 through 2.4.58

Description:

HTTP Response splitting in multiple modules in Apache HTTP Server allows an
attacker that can inject malicious response headers into backend
applications to cause an HTTP desynchronization attack.

Users are recommended to upgrade to version 2.4.59, which fixes this issue.

Credit:

Keran Mu, Tsinghua University and Zhongguancun Laboratory. (finder)
Jianjun Chen, Tsinghua University and Zhongguancun Laboratory. (finder)

References:

https://httpd.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-24795





===
Computer Security Incident Response Team - CSIRT
Universidade Estadual de Campinas - Unicamp
Centro de Computacao - CCUEC
GnuPG Public Key: http://www.security.unicamp.br/security.asc [^]
Contato: +55 19 3521-2289 ou INOC-DBA: 1251*830
-------------- Próxima Parte ----------
Um anexo em HTML foi limpo...
URL: <http://www.listas.unicamp.br/pipermail/security-l/attachments/20240404/27f9e5db/attachment.html>


Mais detalhes sobre a lista de discussão SECURITY-L