First published: Wed Aug 05 2020(Updated: )
A flaw was found in Apache httpd in versions 2.4.20 to 2.4.43. Logging using the wrong pool by mod_http2 at debug/trace log level may lead to potential crashes and denial of service. The highest threat from this vulnerability is to system availability.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apr | <0:1.6.3-104.jbcs.el6 | 0:1.6.3-104.jbcs.el6 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-75.jbcs.el6 | 0:1.6.1-75.jbcs.el6 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-38.jbcs.el6 | 0:1.0.6-38.jbcs.el6 |
redhat/jbcs-httpd24-curl | <0:7.64.1-44.jbcs.el6 | 0:7.64.1-44.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-64.jbcs.el6 | 0:2.4.37-64.jbcs.el6 |
redhat/jbcs-httpd24-jansson | <0:2.11-53.jbcs.el6 | 0:2.11-53.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-34.jbcs.el6 | 0:1.39.2-34.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-32.jbcs.el6 | 1:1.1.1c-32.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-104.jbcs.el7 | 0:1.6.3-104.jbcs.el7 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-75.jbcs.el7 | 0:1.6.1-75.jbcs.el7 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-38.jbcs.el7 | 0:1.0.6-38.jbcs.el7 |
redhat/jbcs-httpd24-curl | <0:7.64.1-44.jbcs.el7 | 0:7.64.1-44.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-64.jbcs.el7 | 0:2.4.37-64.jbcs.el7 |
redhat/jbcs-httpd24-jansson | <0:2.11-53.jbcs.el7 | 0:2.11-53.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-34.jbcs.el7 | 0:1.39.2-34.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-32.jbcs.el7 | 1:1.1.1c-32.jbcs.el7 |
redhat/jbcs-httpd24-openssl-chil | <0:1.0.0-1.jbcs.el7 | 0:1.0.0-1.jbcs.el7 |
redhat/httpd24-httpd | <0:2.4.34-22.el7 | 0:2.4.34-22.el7 |
redhat/httpd | <2.4.44 | 2.4.44 |
debian/apache2 | 2.4.62-1~deb11u1 2.4.62-1~deb11u2 2.4.62-1~deb12u2 2.4.63-1 | |
Apache Http Server | >=2.4.20<=2.4.43 | |
NetApp Clustered Data ONTAP | ||
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =20.04 | |
openSUSE | =15.1 | |
openSUSE | =15.2 | |
Debian GNU/Linux | =10.0 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
oracle communications element manager | >=8.2.0<=8.2.2 | |
oracle communications session report manager | >=8.2.0<=8.2.2 | |
oracle communications session route manager | >=8.2.0<=8.2.2 | |
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
oracle hyperion infrastructure technology | =11.1.2.4 | |
oracle instantis enterprisetrack | =17.1 | |
oracle instantis enterprisetrack | =17.2 | |
oracle instantis enterprisetrack | =17.3 | |
Oracle Sun ZFS Storage Appliance Kit | =8.8 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
Debian | =10.0 | |
Fedora | =31 | |
Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2020-11993.
The severity of CVE-2020-11993 is high.
Apache HTTP Server versions 2.4.20 to 2.4.43 are affected by CVE-2020-11993.
Configuring the LogLevel of mod_http2 above "info" will mitigate CVE-2020-11993.
You can find more information about CVE-2020-11993 at the following references: [1] [2] [3]