Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-27316— Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames

EPSS 89.41% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-27316

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames
Source: NVD (National Vulnerability Database)
Vulnerability Description
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
不加限制或调节的资源分配
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache httpd 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache httpd是美国阿帕奇(Apache)基金会的一款专为现代操作系统开发和维护的开源HTTP服务器。 Apache httpd 存在资源管理错误漏洞,该漏洞源于允许客户端不停发送 HTTP/2 标头,导致内存耗尽。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache HTTP Server 2.4.17 ~ 2.4.58 -

II. Public POCs for CVE-2024-27316

#POC DescriptionSource LinkShenlong Link
1Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)https://github.com/lockness-Ko/CVE-2024-27316POC Details
2Nonehttps://github.com/aeyesec/CVE-2024-27316_pocPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-27316

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2024-04-04 · 6 CVEs total

CVE-2024-29006Apache CloudStack: x-forwarded-for HTTP header parsed by default
CVE-2024-29007Apache CloudStack: When downloading templates or ISOs, the management server and SSVM foll
CVE-2024-29008Apache CloudStack: The extraconfig feature can be abused to load hypervisor resources on a
CVE-2023-38709Apache HTTP Server: HTTP response splitting
CVE-2024-24795Apache HTTP Server: HTTP Response Splitting in multiple modules

IV. Related Vulnerabilities

V. Comments for CVE-2024-27316

No comments yet


Leave a comment