Vulnerability Description
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Http Server | >= 2.4.17, <= 2.4.34 |
| Canonical | Ubuntu Linux | 18.04 |
| Redhat | Enterprise Linux | 6.0 |
| Oracle | Enterprise Manager Ops Center | 12.3.3 |
| Oracle | Hospitality Guest Access | 4.2.0 |
| Oracle | Instantis Enterprisetrack | 17.1 |
| Oracle | Retail Xstore Point Of Service | 7.0 |
| Oracle | Secure Global Desktop | 5.4 |
| Netapp | Storage Automation Store | - |
References
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
- http://www.securityfocus.com/bid/105414Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1041713Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:3558Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0366Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0367Third Party Advisory
- https://httpd.apache.org/security/vulnerabilities_24.htmlVendor Advisory
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cd
- https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e10
- https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda
- https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935
- https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d9784
- https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f8
FAQ
What is CVE-2018-11763?
CVE-2018-11763 is a vulnerability with a CVSS score of 5.9 (MEDIUM). In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This ...
How severe is CVE-2018-11763?
CVE-2018-11763 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-11763?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Canonical Ubuntu Linux, Redhat Enterprise Linux, Oracle Enterprise Manager Ops Center, Oracle Hospitality Guest Access.