First published: Mon Jul 08 2024(Updated: )
Marc Stern discovered that the Apache HTTP Server incorrectly handled serving WebSocket protocol upgrades over HTTP/2 connections. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-36387) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly sent certain request URLs with incorrect encodings to backends. A remote attacker could possibly use this issue to bypass authentication. (CVE-2024-38473) Orange Tsai discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain substitutions. A remote attacker could possibly use this issue to execute scripts in directories not directly reachable by any URL, or cause a denial of service. Some environments may require using the new UnsafeAllow3F flag to handle unsafe substitutions. (CVE-2024-38474, CVE-2024-38475, CVE-2024-39573) Orange Tsai discovered that the Apache HTTP Server incorrectly handled certain response headers. A remote attacker could possibly use this issue to obtain sensitive information, execute local scripts, or perform SSRF attacks. (CVE-2024-38476) Orange Tsai discovered that the Apache HTTP Server mod_proxy module incorrectly handled certain requests. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2024-38477) It was discovered that the Apache HTTP Server incorrectly handled certain handlers configured via AddType. A remote attacker could possibly use this issue to obtain source code. (CVE-2024-39884)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/apache2 | <2.4.58-1ubuntu8.2 | 2.4.58-1ubuntu8.2 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/apache2 | <2.4.57-2ubuntu2.5 | 2.4.57-2ubuntu2.5 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/apache2 | <2.4.52-1ubuntu4.10 | 2.4.52-1ubuntu4.10 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/apache2 | <2.4.41-4ubuntu3.19 | 2.4.41-4ubuntu3.19 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-6885-1 has been classified as a denial of service vulnerability that could allow attackers to crash the Apache HTTP Server.
To fix USN-6885-1, update to the patched versions of the Apache2 package provided in the Ubuntu security advisory.
USN-6885-1 affects multiple versions of Apache HTTP Server running on specific Ubuntu distributions prior to the patched versions.
Yes, a remote attacker could exploit USN-6885-1 by manipulating WebSocket protocol upgrades to cause the server to crash.
USN-6885-1 impacts the Apache2 package on Ubuntu systems, specifically versions prior to the updates released in the security notice.