Apache HTTP Server 2.4.37 mod_http2 Slowloris resource consumption

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.2 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in Apache HTTP Server 2.4.37 and classified as problematic. Affected by this issue is some unknown functionality of the component mod_http2. Performing a manipulation results in resource consumption (Slowloris). This vulnerability is cataloged as CVE-2018-17189. It is possible to initiate the attack remotely. There is no exploit available. The affected component should be upgraded.
Details
A vulnerability classified as problematic has been found in Apache HTTP Server 2.4.37 (Web Server). This affects an unknown part of the component mod_http2. The manipulation with an unknown input leads to a resource consumption vulnerability (Slowloris). CWE is classifying the issue as CWE-400. The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. This is going to have an impact on availability. The summary by CVE is:
In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections.
The bug was discovered 01/22/2019. The weakness was shared 01/30/2019 (Website). The advisory is shared at httpd.apache.org. This vulnerability is uniquely identified as CVE-2018-17189 since 09/19/2018. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Neither technical details nor an exploit are publicly available. MITRE ATT&CK project uses the attack technique T1499 for this issue.
The vulnerability scanner Nessus provides a plugin with the ID 121327 (Slackware 14.0 / 14.1 / 14.2 / current : httpd (SSA:2019-022-01)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Slackware Local Security Checks and running in the context l. The commercial vulnerability scanner Qualys is able to test this issue with plugin 172085 (SUSE Enterprise Linux Security Update for apache2 (SUSE-SU-2019:0498-1)).
Upgrading eliminates this vulnerability. A possible mitigation has been published even before and not after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at Tenable (121327) and SecurityFocus (BID 106685†). The entries VDB-103521, VDB-108939, VDB-115057 and VDB-115038 are related to this item. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.apache.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.2
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 5.3
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Name: SlowlorisClass: Resource consumption / Slowloris
CWE: CWE-400 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 121327
Nessus Name: Slackware 14.0 / 14.1 / 14.2 / current : httpd (SSA:2019-022-01)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
09/19/2018 🔍01/22/2019 🔍
01/22/2019 🔍
01/22/2019 🔍
01/23/2019 🔍
01/30/2019 🔍
01/30/2019 🔍
01/31/2019 🔍
07/04/2023 🔍
Sources
Vendor: apache.orgAdvisory: RHSA-2019:3932
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2018-17189 (🔍)
GCVE (CVE): GCVE-0-2018-17189
GCVE (VulDB): GCVE-100-130329
SecurityFocus: 106685 - Apache HTTP Server CVE-2018-17189 Denial of Service Vulnerability
See also: 🔍
Entry
Created: 01/31/2019 13:02Updated: 07/04/2023 08:24
Changes: 01/31/2019 13:02 (70), 05/06/2020 18:48 (6), 07/04/2023 08:24 (4)
Complete: 🔍
Cache ID: 216:61D:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.