Description
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-3783-1 | Apache HTTP Server vulnerabilities |
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Apache
Subscribe
Http Server
Subscribe
Canonical
Subscribe
Ubuntu Linux
Subscribe
Netapp
Subscribe
Storage Automation Store
Subscribe
Oracle
Subscribe
Enterprise Manager Ops Center
Subscribe
Hospitality Guest Access
Subscribe
Instantis Enterprisetrack
Subscribe
Retail Xstore Point Of Service
Subscribe
Secure Global Desktop
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Rhel Software Collections
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-17T02:21:55.083Z
Reserved: 2018-06-05T00:00:00.000Z
Link: CVE-2018-11763
No data.
Status : Modified
Published: 2018-09-25T21:29:00.283
Modified: 2024-11-21T03:43:58.790
Link: CVE-2018-11763
OpenCVE Enrichment
No data.
Weaknesses
Ubuntu USN