Vulnerability Description
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Http Server | >= 2.4.17, < 2.4.59 |
| Fedoraproject | Fedora | 38 |
| Netapp | Ontap | 9 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://www.openwall.com/lists/oss-security/2024/04/04/4Mailing List
- https://httpd.apache.org/security/vulnerabilities_24.htmlProductRelease Notes
- https://support.apple.com/kb/HT214119
- https://www.openwall.com/lists/oss-security/2024/04/03/16
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://www.openwall.com/lists/oss-security/2024/04/04/4Mailing List
- https://httpd.apache.org/security/vulnerabilities_24.htmlProductRelease Notes
- https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://security.netapp.com/advisory/ntap-20240415-0013/
- https://support.apple.com/kb/HT214119
- https://www.kb.cert.org/vuls/id/421644
- https://www.openwall.com/lists/oss-security/2024/04/03/16
FAQ
What is CVE-2024-27316?
CVE-2024-27316 is a vulnerability with a CVSS score of 7.5 (HIGH). HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory e...
How severe is CVE-2024-27316?
CVE-2024-27316 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-27316?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Fedoraproject Fedora, Netapp Ontap.