Skip to main content

Allocation of Resources Without Limits or Throttling in httpd

CVE-2024-27316

  • httpd
Severity High
Score 7.5/10

Summary

The Apache HTTP Server implementation of the HTTP/2 protocol is vulnerable to the "CONTINUATION Flood". HTTP/2 incoming headers that exceed the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers in a stream, using "CONTINUATION" frames, this leads to memory exhaustion and will cause a Denial of Service. This issue affects the package httpd versions 2.4.17 through 2.4.58, and 2.5.0-x versions.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • NONE
  • HIGH

CWE-770 - Allocation of Resources Without Limits or Throttling

The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.

Advisory Timeline

  • Published