Allocation of Resources Without Limits or Throttling in httpd
CVE-2024-27316
- httpd
Summary
The Apache HTTP Server implementation of the HTTP/2 protocol is vulnerable to the "CONTINUATION Flood". HTTP/2 incoming headers that exceed the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers in a stream, using "CONTINUATION" frames, this leads to memory exhaustion and will cause a Denial of Service. This issue affects the package httpd versions 2.4.17 through 2.4.58, and 2.5.0-x versions.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- NONE
- HIGH
CWE-770 - Allocation of Resources Without Limits or Throttling
The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Advisory Timeline
- Published