Vulnerability Description
Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Http Server | >= 2.4.20, < 2.4.46 |
| Oracle | Communications Element Manager | >= 8.2.0, <= 8.2.2 |
| Oracle | Communications Session Report Manager | >= 8.2.0, <= 8.2.2 |
| Oracle | Communications Session Route Manager | >= 8.2.0, <= 8.2.2 |
| Oracle | Enterprise Manager Ops Center | 12.4.0.0 |
| Oracle | Hyperion Infrastructure Technology | 11.1.2.4 |
| Oracle | Instantis Enterprisetrack | 17.1 |
| Oracle | Zfs Storage Appliance Kit | 8.8 |
| Opensuse | Leap | 15.1 |
| Debian | Debian Linux | 10.0 |
| Fedoraproject | Fedora | 31 |
| Canonical | Ubuntu Linux | 16.04 |
| Redhat | Software Collections | 1.0 |
| Redhat | Enterprise Linux | 6.0 |
| Redhat | Openstack | 16.1 |
| Redhat | Openstack For Ibm Power | 16.1 |
| Redhat | Enterprise Linux Eus | 8.1 |
| Redhat | Enterprise Linux For Ibm Z Systems | 8.0 |
| Redhat | Enterprise Linux For Ibm Z Systems Eus | 8.1 |
| Redhat | Enterprise Linux For Power Little Endian | 8.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.htmlMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/160392/Apache-2.4.43-mod_http2-Memory-CorruThird Party AdvisoryVDB Entry
- https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-9490Vendor Advisory
- https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda
- https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d
- https://lists.apache.org/thread.html/r0b6541c5fb2f8fb383861333400add7def625bc993
- https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46
- https://lists.apache.org/thread.html/r5debe8f82728a00a4a68bc904dd6c35423bdfc8d60
- https://lists.apache.org/thread.html/r623de9b2b2433a87f3f3a15900419fc9c00c77b269
- https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37
- https://lists.apache.org/thread.html/r97d0faab6ed8fd0d439234b16d05d77b22a07b0c48
- https://lists.apache.org/thread.html/r9e485ce5a01c9dc3d4d785a7d28aa7400ead1e8188
- https://lists.apache.org/thread.html/r9e9f1a7609760f0f80562eaaec2aa3c32d525c3e0f
FAQ
What is CVE-2020-9490?
CVE-2020-9490 is a vulnerability with a CVSS score of 7.5 (HIGH). Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resour...
How severe is CVE-2020-9490?
CVE-2020-9490 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-9490?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Oracle Communications Element Manager, Oracle Communications Session Report Manager, Oracle Communications Session Route Manager, Oracle Enterprise Manager Ops Center.