First published: Thu Oct 19 2023(Updated: )
An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern. This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout. This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57. Users are recommended to upgrade to version 2.4.58, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP server | >=2.4.55<2.4.58 | |
ubuntu/apache2 | <2.4.55-1ubuntu2.1 | 2.4.55-1ubuntu2.1 |
ubuntu/apache2 | <2.4.57-2ubuntu2.1 | 2.4.57-2ubuntu2.1 |
ubuntu/apache2 | <2.4.58-1 | 2.4.58-1 |
debian/apache2 | <=2.4.56-1~deb11u2<=2.4.57-2 | 2.4.38-3+deb10u8 2.4.38-3+deb10u10 2.4.59-1~deb11u1 2.4.59-1~deb12u1 2.4.58-1 2.4.59-1 |
redhat/mod_http2 | <2.0.23 | 2.0.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43622 is a vulnerability in the Apache HTTP Server that allows an attacker to block the handling of a connection indefinitely by opening an HTTP/2 connection with an initial window size of 0.
The vulnerability in CVE-2023-43622 can be used to exhaust worker resources in the server, similar to the 'slow loris' attack pattern.
Versions of Apache HTTP Server from 2.4.55 to 2.4.58 are affected by CVE-2023-43622.
The vulnerability has been fixed in version 2.4.59 of Apache HTTP Server. It is recommended to upgrade to this version or a later version.
You can find more information about CVE-2023-43622 on the Apache HTTP Server website and the NetApp security advisory.