First published: Tue Jan 22 2019(Updated: )
A flaw was found in HTTP/2 (mod_http2) connections in Apache HTTP Server httpd 2.4.17 to 2.4.37. A DoS can be triggered by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. References: <a href="https://seclists.org/oss-sec/2019/q1/80">https://seclists.org/oss-sec/2019/q1/80</a> <a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a>
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apr | <0:1.6.3-63.jbcs.el6 | 0:1.6.3-63.jbcs.el6 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-48.jbcs.el6 | 0:1.6.1-48.jbcs.el6 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-7.jbcs.el6 | 0:1.0.6-7.jbcs.el6 |
redhat/jbcs-httpd24-curl | <0:7.64.1-14.jbcs.el6 | 0:7.64.1-14.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-33.jbcs.el6 | 0:2.4.37-33.jbcs.el6 |
redhat/jbcs-httpd24-jansson | <0:2.11-20.jbcs.el6 | 0:2.11-20.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-4.jbcs.el6 | 0:1.39.2-4.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.1.1-25.jbcs.el6 | 1:1.1.1-25.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-63.jbcs.el7 | 0:1.6.3-63.jbcs.el7 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-48.jbcs.el7 | 0:1.6.1-48.jbcs.el7 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-7.jbcs.el7 | 0:1.0.6-7.jbcs.el7 |
redhat/jbcs-httpd24-curl | <0:7.64.1-14.jbcs.el7 | 0:7.64.1-14.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-33.jbcs.el7 | 0:2.4.37-33.jbcs.el7 |
redhat/jbcs-httpd24-jansson | <0:2.11-20.jbcs.el7 | 0:2.11-20.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-4.jbcs.el7 | 0:1.39.2-4.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1-25.jbcs.el7 | 1:1.1.1-25.jbcs.el7 |
redhat/httpd24 | <0:1.1-19.el6 | 0:1.1-19.el6 |
redhat/httpd24-httpd | <0:2.4.34-15.el6 | 0:2.4.34-15.el6 |
redhat/httpd24-nghttp2 | <0:1.7.1-8.el6 | 0:1.7.1-8.el6 |
redhat/httpd24 | <0:1.1-19.el7 | 0:1.1-19.el7 |
redhat/httpd24-httpd | <0:2.4.34-15.el7 | 0:2.4.34-15.el7 |
redhat/httpd24-nghttp2 | <0:1.7.1-8.el7 | 0:1.7.1-8.el7 |
debian/apache2 | <=2.4.25-3<=2.4.37-1<=2.4.25-3+deb9u6 | 2.4.38-1 2.4.25-3+deb9u7 |
redhat/httpd | <2.4.38 | 2.4.38 |
debian/apache2 | 2.4.62-1~deb11u1 2.4.62-1~deb11u2 2.4.62-1~deb12u2 2.4.63-1 | |
Apache HTTP Server | =2.4.17 | |
Apache HTTP Server | =2.4.18 | |
Apache HTTP Server | =2.4.20 | |
Apache HTTP Server | =2.4.23 | |
Apache HTTP Server | =2.4.25 | |
Apache HTTP Server | =2.4.26 | |
Apache HTTP Server | =2.4.27 | |
Apache HTTP Server | =2.4.28 | |
Apache HTTP Server | =2.4.29 | |
Apache HTTP Server | =2.4.30 | |
Apache HTTP Server | =2.4.33 | |
Apache HTTP Server | =2.4.34 | |
Apache HTTP Server | =2.4.35 | |
Apache HTTP Server | =2.4.37 | |
NetApp SANtricity Cloud Connector | ||
NetApp Storage Automation Store | ||
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
Debian GNU/Linux | =9.0 | |
Oracle Enterprise Manager Ops Center | =12.3.3 | |
Oracle Hospitality Guest Access | =4.2.0 | |
Oracle Hospitality Guest Access | =4.2.1 | |
oracle instantis enterprisetrack | =17.1 | |
oracle instantis enterprisetrack | =17.2 | |
oracle instantis enterprisetrack | =17.3 | |
Oracle Retail Xstore Office Cloud Service | =7.0 | |
Oracle Retail Xstore Office Cloud Service | =7.1 | |
Oracle Sun ZFS Storage Appliance Kit software | =8.8.6 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
All of | ||
redhat jboss core services | =1.0 | |
Any of | ||
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
redhat jboss core services | =1.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-17189 is classified as a DoS (Denial of Service) vulnerability.
To fix CVE-2018-17189, upgrade to version 2.4.38 or later of the Apache HTTP Server.
CVE-2018-17189 affects Apache HTTP Server versions 2.4.17 to 2.4.37.
If your server is vulnerable to CVE-2018-17189, it can be subjected to resource exhaustion due to slow loris attacks.
Yes, CVE-2018-17189 specifically affects HTTP/2 connections in Apache HTTP Server.