First published: Wed Aug 14 2019(Updated: )
A vulnerability was found in Apache httpd, in mod_http2. Under certain circumstances, HTTP/2 early pushes could lead to memory corruption, causing a server to crash.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apr | <0:1.6.3-86.jbcs.el6 | 0:1.6.3-86.jbcs.el6 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-21.jbcs.el6 | 0:1.0.6-21.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-52.jbcs.el6 | 0:2.4.37-52.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-16.jbcs.el6 | 1:1.1.1c-16.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-86.jbcs.el7 | 0:1.6.3-86.jbcs.el7 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-21.jbcs.el7 | 0:1.0.6-21.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-52.jbcs.el7 | 0:2.4.37-52.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-16.jbcs.el7 | 1:1.1.1c-16.jbcs.el7 |
redhat/httpd | <2.4.41 | 2.4.41 |
Apache HTTP Server | >=2.4.20<=2.4.39 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/apache2 | 2.4.62-1~deb11u1 2.4.62-1~deb11u2 2.4.62-1~deb12u2 2.4.62-3 2.4.63-1 | |
Debian | =9.0 | |
Debian | =10.0 |
This flaw is only exploitable if Apache httpd is configured to respond to HTTP/2 requests, which is done by including "h2" or "h2c" in the "Protocols" list in a configuration file. The following command can be used to search for possible vulnerable configurations: grep -R '^\s*Protocols\>.*\<h2\>' /etc/httpd/ See https://httpd.apache.org/docs/2.4/mod/mod_http2.html
Unpatched servers can disable HTTP/2 push with the "H2Push off" directive.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2019-10081 is medium.
CVE-2019-10081 affects Apache httpd versions 2.4.20 through 2.4.39.
To fix CVE-2019-10081, update Apache httpd to version 2.4.41 or higher.
The impact of CVE-2019-10081 is memory overwrite and potential crashes in Apache httpd.
Yes, you can refer to the following links for additional information: [Bugzilla Red Hat - ID 1743967](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1743967), [Bugzilla Red Hat - ID 1743968](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1743968), [Bugzilla Red Hat - ID 1743969](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1743969).