CVE-2019-0196
Published: 2 April 2019
A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.
Priority
Status
Package | Release | Status |
---|---|---|
apache2 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
trusty |
Not vulnerable
(code not present)
|
|
xenial |
Not vulnerable
(code not built)
|
|
bionic |
Released
(2.4.29-1ubuntu4.6)
|
|
cosmic |
Released
(2.4.34-1ubuntu2.1)
|
|
Patches: upstream: https://github.com/apache/httpd/commit/8de3c6f2a0df79d1476c89ec480a96f9282cea28 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | Low |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |