[ANNOUNCEMENT] Apache HTTP Server 2.4.33 Released

2018-03-26 Thread Daniel Ruggeri
Apache HTTP Server 2.4.33 Released March 26, 2018 The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the release of version 2.4.33 of the Apache HTTP Server ("Apache"). This version of Apache is our latest GA release of the

CVE-2018-1312: Weak Digest auth nonce generation in mod_auth_digest

2018-03-26 Thread Daniel Ruggeri
CVE-2018-1312: Weak Digest auth nonce generation in mod_auth_digest Severity: Low Vendor: The Apache Software Foundation Versions Affected: httpd 2.2.0 to 2.4.29 Description: When generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly

CVE-2018-1303: Possible out of bound read in mod_cache_socache

2018-03-26 Thread Daniel Ruggeri
CVE-2018-1303: Possible out of bound read in mod_cache_socache Severity: Low Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.5 to 2.4.29 Description: A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of

CVE-2018-1301: Possible out of bound access after failure in reading the HTTP request

2018-03-26 Thread Daniel Ruggeri
CVE-2018-1301: Possible out of bound access after failure in reading the HTTP request Severity: Low Vendor: The Apache Software Foundation Versions Affected: httpd 2.0.1 to 2.4.29 Description: A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due

CVE-2018-1302: Possible write of after free on HTTP/2 stream shutdown

2018-03-26 Thread Daniel Ruggeri
CVE-2018-1302: Possible write of after free on HTTP/2 stream shutdown Severity: Low Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.17 to 2.4.29 Description: When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have

CVE-2018-1283: Tampering of mod_session data for CGI applications

2018-03-26 Thread Daniel Ruggeri
CVE-2018-1283: Tampering of mod_session data for CGI applications. Severity: Medium Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.0 to 2.4.29 Description: When mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a

[ANNOUNCEMENT] Apache HTTP Server 2.4.35 Released

2018-09-25 Thread Daniel Ruggeri
Apache HTTP Server 2.4.35 Released September 25, 2018 The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the release of version 2.4.35 of the Apache HTTP Server ("Apache"). This version of Apache is our latest GA release of

CVE-2018-17189: mod_http2, DoS via slow, unneeded request bodies

2019-01-22 Thread Daniel Ruggeri
CVE-2018-17189: mod_http2, DoS via slow, unneeded request bodies Severity: Low Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.17 to 2.4.37 Description: By sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily

[ANNOUNCEMENT] Apache HTTP Server 2.4.38 Released

2019-01-22 Thread Daniel Ruggeri
Apache HTTP Server 2.4.38 Released January 22, 2019 The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the release of version 2.4.38 of the Apache HTTP Server ("Apache"). This version of Apache is our latest GA release of the

CVE-2019-0190: mod_ssl 2.4.37 remote DoS when used with OpenSSL 1.1.1

2019-01-22 Thread Daniel Ruggeri
CVE-2019-0190: mod_ssl 2.4.37 remote DoS when used with OpenSSL 1.1.1 Severity: Important Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.37 Description: A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted

CVE-2018-17199: mod_session_cookie does not respect expiry time

2019-01-22 Thread Daniel Ruggeri
CVE-2018-17199: mod_session_cookie does not respect expiry time Severity: low Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.0 to 2.4.37 Description: In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the

[ANNOUNCEMENT] Apache HTTP Server 2.4.39 Released

2019-04-02 Thread Daniel Ruggeri
Apache HTTP Server 2.4.39 Released April 02, 2019 The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the release of version 2.4.39 of the Apache HTTP Server ("Apache"). This version of Apache is our latest GA release of the

CVE-2019-10082: mod_http2, read-after-free in h2 connection shutdown

2019-08-14 Thread Daniel Ruggeri
CVE-2019-10082: mod_http2, read-after-free in h2 connection shutdown Severity: Moderate Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.18 to 2.4.39 Description: Using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during

[ANNOUNCEMENT] Apache HTTP Server 2.4.41 Released

2019-08-14 Thread Daniel Ruggeri
Apache HTTP Server 2.4.41 Released August 14, 2019 The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the release of version 2.4.41 of the Apache HTTP Server ("Apache"). This version of Apache is our latest GA release of the

CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers

2019-08-14 Thread Daniel Ruggeri
CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers. Severity: Moderate Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.20 to 2.4.39 Description: A malicious client could perform a DoS attack by flooding a connection with requests and basically never reading

CVE-2019-10098: mod_rewrite configurations vulnerable to open redirect

2019-08-14 Thread Daniel Ruggeri
CVE-2019-10098: mod_rewrite configurations vulnerable to open redirect Severity: Low Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.0 to 2.4.39 Description: Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded

CVE-2019-10092: Limited cross-site scripting in mod_proxy

2019-08-14 Thread Daniel Ruggeri
CVE-2019-10092: Limited cross-site scripting in mod_proxy Severity: Low Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.0-2.4.39 Description: A limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the

CVE-2019-10097: mod_remoteip stack buffer overflow and NULL pointer dereference

2019-08-14 Thread Daniel Ruggeri
CVE-2019-10097: mod_remoteip stack buffer overflow and NULL pointer dereference Severity: Moderate Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.32 to 2.4.39 Description: When mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY"

CVE-2020-11993: Push Diary Crash on Specifically Crafted HTTP/2 Header

2020-08-07 Thread Daniel Ruggeri
CVE-2020-11993: Push Diary Crash on Specifically Crafted HTTP/2 Header Severity: moderate Vendor: Apache Software Foundation Versions Affected: Apache HTTP Server 2.4.20 to 2.4.43 Description: Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and

CVE-2020-9490: Push Diary Crash on Specifically Crafted HTTP/2 Header

2020-08-07 Thread Daniel Ruggeri
CVE-2020-9490: Push Diary Crash on Specifically Crafted HTTP/2 Header Severity: important Vendor: Apache Software Foundation Versions Affected: Apache HTTP Server 2.4.20 to 2.4.43 Description: Apache HTTP Server versions 2.4.20 to 2.4.43 A specially crafted value for the 'Cache-Digest'

[ANNOUNCEMENT] Apache HTTP Server 2.4.46 Released

2020-08-07 Thread Daniel Ruggeri
Apache HTTP Server 2.4.46 Released August 07, 2020 The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the release of version 2.4.46 of the Apache HTTP Server ("Apache"). This version of Apache is our latest GA release of the

CVE-2020-11984: mod_uwsgi buffer overlow

2020-08-07 Thread Daniel Ruggeri
CVE-2020-11984: mod_uwsgi buffer overlow Severity: moderate Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.32 to 2.4.44 Description: Apache HTTP Server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE Mitigation: disable mod_uwsgi Credit:

CVE-2020-11985: CWE-345: Insufficient verification of data authenticity

2020-08-07 Thread Daniel Ruggeri
CVE-2020-11985: CWE-345: Insufficient verification of data authenticity Severity: low Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.1 to 2.4.23 Description: Apache HTTP Server 2.4.1 to 2.4.23 IP address spoofing when proxying using mod_remoteip and mod_rewrite