First published: Tue Sep 25 2018(Updated: )
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP server | >=2.4.17<=2.4.34 | |
Canonical Ubuntu Linux | =18.04 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =7.4 | |
Redhat Enterprise Linux | =7.5 | |
Redhat Enterprise Linux | =7.6 | |
Oracle Enterprise Manager Ops Center | =12.3.3 | |
Oracle Hospitality Guest Access | =4.2.0 | |
Oracle Hospitality Guest Access | =4.2.1 | |
Oracle Instantis Enterprisetrack | =17.1 | |
Oracle Instantis Enterprisetrack | =17.2 | |
Oracle Instantis Enterprisetrack | =17.3 | |
Oracle Retail Xstore Point of Service | =7.0 | |
Oracle Retail Xstore Point of Service | =7.1 | |
Oracle Secure Global Desktop | =5.4 | |
Netapp Storage Automation Store | ||
redhat/httpd | <2.4.35 | 2.4.35 |
redhat/mod_http2 | <1.11.0 | 1.11.0 |
debian/apache2 | 2.4.62-1~deb11u1 2.4.61-1~deb11u1 2.4.62-1~deb12u1 2.4.61-1~deb12u1 2.4.62-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-11763 is medium (5.9).
CVE-2018-11763 affects Apache HTTP Server versions 2.4.17 to 2.4.34.
A possible mitigation for CVE-2018-11763 is to not enable the h2 protocol.
CVE-2018-11763 affects Apache HTTP Server versions 2.4.17 to 2.4.34, mod_http2 version up to 1.11.0, and some versions of Redhat Enterprise Linux, Canonical Ubuntu Linux, Oracle Enterprise Manager Ops Center, Oracle Hospitality Guest Access, Oracle Instantis Enterprisetrack, Oracle Retail Xstore Point of Service, Oracle Secure Global Desktop, and Netapp Storage Automation Store.
To fix CVE-2018-11763, update Apache HTTP Server to version 2.4.35 or higher.