CVE-2018-1333

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.18-2.4.30,2.4.33).

References

https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-1333

http://www.securitytracker.com/id/1041402

https://security.netapp.com/advisory/ntap-20180926-0007/

https://usn.ubuntu.com/3783-1/

https://access.redhat.com/errata/RHSA-2018:3558

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us

https://access.redhat.com/errata/RHSA-2019:0367

https://access.redhat.com/errata/RHSA-2019:0366

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://www.tenable.com/security/tns-2019-09

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

Details

Source: MITRE

Published: 2018-06-18

Updated: 2021-06-06

Type: CWE-400

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
123274openSUSE Security Update : apache2 (openSUSE-2019-632)NessusSuSE Local Security Checks
high
122292RHEL 6 / 7 : Red Hat JBoss Core Services Apache HTTP Server 2.4.29 (RHSA-2019:0367)NessusRed Hat Local Security Checks
critical
121991Photon OS 2.0: Httpd PHSA-2018-2.0-0089NessusPhotonOS Local Security Checks
high
121885Photon OS 1.0: Httpd PHSA-2018-1.0-0181NessusPhotonOS Local Security Checks
high
98915Apache 2.4.x < 2.4.34 Multiple VulnerabilitiesWeb Application ScanningComponent Vulnerability
high
120085SUSE SLES15 Security Update : apache2 (SUSE-SU-2018:2424-1)NessusSuSE Local Security Checks
high
117916Ubuntu 18.04 LTS : apache2 vulnerabilities (USN-3783-1)NessusUbuntu Local Security Checks
high
117399Photon OS 2.0: Httpd PHSA-2018-2.0-0089 (deprecated)NessusPhotonOS Local Security Checks
high
117336Photon OS 1.0: Httpd PHSA-2018-1.0-0181 (deprecated)NessusPhotonOS Local Security Checks
high
112006openSUSE Security Update : apache2 (openSUSE-2018-907)NessusSuSE Local Security Checks
high
112002openSUSE Security Update : apache2 (openSUSE-2018-893)NessusSuSE Local Security Checks
high
111788Apache 2.4.x < 2.4.34 Multiple VulnerabilitiesNessusWeb Servers
high
111784SUSE SLES12 Security Update : apache2 (SUSE-SU-2018:2336-1)NessusSuSE Local Security Checks
high
111185Slackware 14.0 / 14.1 / 14.2 / current : httpd (SSA:2018-199-01)NessusSlackware Local Security Checks
high
111177FreeBSD : Apache httpd -- multiple vulnerabilities (8b1a50ab-8a8e-11e8-add2-b499baebfeaf)NessusFreeBSD Local Security Checks
high