First published: Wed Aug 05 2020(Updated: )
A flaw was found in Apache httpd in versions 2.4.32 to 2.4.46. The uwsgi protocol does not serialize more than 16K of HTTP header leading to resource exhaustion and denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apr | <0:1.6.3-104.jbcs.el6 | 0:1.6.3-104.jbcs.el6 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-75.jbcs.el6 | 0:1.6.1-75.jbcs.el6 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-38.jbcs.el6 | 0:1.0.6-38.jbcs.el6 |
redhat/jbcs-httpd24-curl | <0:7.64.1-44.jbcs.el6 | 0:7.64.1-44.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-64.jbcs.el6 | 0:2.4.37-64.jbcs.el6 |
redhat/jbcs-httpd24-jansson | <0:2.11-53.jbcs.el6 | 0:2.11-53.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-34.jbcs.el6 | 0:1.39.2-34.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-32.jbcs.el6 | 1:1.1.1c-32.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-104.jbcs.el7 | 0:1.6.3-104.jbcs.el7 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-75.jbcs.el7 | 0:1.6.1-75.jbcs.el7 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-38.jbcs.el7 | 0:1.0.6-38.jbcs.el7 |
redhat/jbcs-httpd24-curl | <0:7.64.1-44.jbcs.el7 | 0:7.64.1-44.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-64.jbcs.el7 | 0:2.4.37-64.jbcs.el7 |
redhat/jbcs-httpd24-jansson | <0:2.11-53.jbcs.el7 | 0:2.11-53.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-34.jbcs.el7 | 0:1.39.2-34.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-32.jbcs.el7 | 1:1.1.1c-32.jbcs.el7 |
redhat/jbcs-httpd24-openssl-chil | <0:1.0.0-1.jbcs.el7 | 0:1.0.0-1.jbcs.el7 |
redhat/httpd24-httpd | <0:2.4.34-22.el7 | 0:2.4.34-22.el7 |
Apache HTTP server | >=2.4.32<=2.4.43 | |
NetApp Clustered Data ONTAP | ||
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Oracle Communications Element Manager | >=8.2.0<=8.2.2 | |
Oracle Communications Session Report Manager | >=8.2.0<=8.2.2 | |
Oracle Communications Session Route Manager | >=8.2.0<=8.2.2 | |
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
Oracle Hyperion Infrastructure Technology | =11.1.2.4 | |
Oracle Instantis Enterprisetrack | =17.1 | |
Oracle Instantis Enterprisetrack | =17.2 | |
Oracle Instantis Enterprisetrack | =17.3 | |
Oracle ZFS Storage Appliance Kit | =8.8 | |
redhat/httpd | <2.4.44 | 2.4.44 |
debian/apache2 | 2.4.62-1~deb11u1 2.4.62-1~deb11u2 2.4.62-1~deb12u2 2.4.62-3 | |
debian/uwsgi | <=2.0.19.1-7.1<=2.0.21-5.1<=2.0.28-1 |
This flaw only affects specific httpd configurations which use the uwsgi protocol. It does not manifest itself when uwsgi protocol is not used. Commenting out "LoadModule proxy_uwsgi_module modules/mod_proxy_uwsgi.so" in /etc/httpd/conf.modules.d/00-proxy.conf will disable the loading of the vulnerable module.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-11984 is a vulnerability found in Apache HTTP server versions 2.4.32 to 2.4.44.
The severity of CVE-2020-11984 is critical.
CVE-2020-11984 can lead to data confidentiality and integrity issues.
To fix CVE-2020-11984, upgrade Apache HTTP server to version 2.4.44 or higher.
You can find more information about CVE-2020-11984 in the references provided: http://svn.apache.org/viewvc?view=revision&revision=1880251, https://access.redhat.com/support/policy/updates/jboss_notes, https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1868148.