Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-43622— Apache HTTP Server: DoS in HTTP/2 with initial windows size 0

EPSS 61.26% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-43622

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache HTTP Server: DoS in HTTP/2 with initial windows size 0
Source: NVD (National Vulnerability Database)
Vulnerability Description
An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern. This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout. This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57. Users are recommended to upgrade to version 2.4.58, which fixes the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache HTTP Server 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 2.4.55版本至2.4.57版本存在资源管理错误漏洞,该漏洞源于攻击者打开初始窗口大小为0的HTTP/2连接,能够无限期地阻止Apache HTTP Server中对该连接的处理,这可以耗尽服务器中的工作资源。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache HTTP Server 2.4.55 ~ 2.4.57 -

II. Public POCs for CVE-2023-43622

#POC DescriptionSource LinkShenlong Link
1CVE-2023–43622https://github.com/visudade/CVE-2023-43622POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-43622

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2023-10-23 · 4 CVEs total

CVE-2023-46288Apache Airflow: Sensitive parameters exposed in API when "non-sensitive-only" configuratio
CVE-2023-31122Apache HTTP Server: mod_macro buffer over-read
CVE-2023-45802Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST

IV. Related Vulnerabilities

V. Comments for CVE-2023-43622

No comments yet


Leave a comment