First published: Mon Dec 05 2016(Updated: )
apache. Multiple issues existed in Apache. These were addressed by updating Apache to version 2.4.25.
Credit: CVE-2016-0736 CVE-2016-2161 CVE-2016-5387 CVE-2016-8740 CVE-2016-8743 CVE-2016-0736 CVE-2016-2161 CVE-2016-5387 CVE-2016-8740 CVE-2016-8743 CVE-2017-3167 CVE-2017-3169 CVE-2017-7659 CVE-2017-7668 CVE-2017-7679 CVE-2017-9788 CVE-2017-9789 security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.24 | 2.4.24 |
Apache HTTP Server | =2.4.17 | |
Apache HTTP Server | =2.4.18 | |
Apache HTTP Server | =2.4.19 | |
Apache HTTP Server | =2.4.20 | |
Apache HTTP Server | =2.4.21 | |
Apache HTTP Server | =2.4.22 | |
Apache HTTP Server | =2.4.23 | |
Apple macOS | <10.13 | 10.13 |
Apple macOS | <10.13.1 | 10.13.1 |
Apple Sierra | ||
Apple El Capitan |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2016-8740 is a vulnerability in the Apache HTTP Server that allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request.
CVE-2016-8740 affects Apache HTTP Server versions 2.4.17 through 2.4.23 when the Protocols configuration includes h2 or h2c. It does not restrict request-header length, allowing remote attackers to cause a denial of service.
CVE-2016-8740 has a severity rating of 7.5 (High).
To fix CVE-2016-8740, update your Apache HTTP Server to version 2.4.27 or later.
You can find more information about CVE-2016-8740 at the following references: [1] https://httpd.apache.org/security/vulnerabilities_24.html [2] http://seclists.org/bugtraq/2016/Dec/3 [3] https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1401530