Description
In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1748-1 | apache2 security update |
Debian DSA |
DSA-4422-1 | apache2 security update |
Ubuntu USN |
USN-3937-1 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-3937-2 | Apache vulnerabilities |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Apache
Subscribe
Http Server
Subscribe
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Netapp
Subscribe
Clustered Data Ontap
Subscribe
Oncommand Unified Manager
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Oracle
Subscribe
Enterprise Manager Ops Center
Subscribe
Http Server
Subscribe
Retail Xstore Point Of Service
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Workstation
Subscribe
Jboss Core Services
Subscribe
Rhel Software Collections
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T17:44:15.383Z
Reserved: 2018-11-14T00:00:00.000Z
Link: CVE-2019-0217
No data.
Status : Modified
Published: 2019-04-08T21:29:00.843
Modified: 2024-11-21T04:16:30.643
Link: CVE-2019-0217
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN