First published: Thu Nov 23 2023(Updated: )
David Shoon discovered that the Apache HTTP Server mod_macro module incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/apache2 | <2.4.29-1ubuntu4.27+esm1 | 2.4.29-1ubuntu4.27+esm1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/apache2 | <2.4.18-2ubuntu3.17+esm11 | 2.4.18-2ubuntu3.17+esm11 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/apache2 | <2.4.7-1ubuntu4.22+esm9 | 2.4.7-1ubuntu4.22+esm9 |
Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Apache HTTP Server vulnerability is USN-6510-1.
The Apache HTTP Server mod_macro module incorrectly handles certain memory operations, which can be exploited by a remote attacker to cause a denial of service by crashing the server.
The following versions of Apache HTTP Server are affected: 2.4.29-1ubuntu4.27+esm1, 2.4.18-2ubuntu3.17+esm11, and 2.4.7-1ubuntu4.22+esm9.
To fix this vulnerability, update Apache HTTP Server to version 2.4.29-1ubuntu4.27+esm1 for Ubuntu 18.04, version 2.4.18-2ubuntu3.17+esm11 for Ubuntu 16.04, or version 2.4.7-1ubuntu4.22+esm9 for Ubuntu 14.04.
You can find more information about this Apache HTTP Server vulnerability on the Ubuntu Security Notices page: [link](https://ubuntu.com/security/notices/USN-6510-1)