Lucene search

K
f5F5F5:K44591505
HistoryMay 07, 2019 - 12:00 a.m.

K44591505 : Apache vulnerabilities CVE-2019-0196, CVE-2019-0197, and CVE-2019-0220

2019-05-0700:00:00
my.f5.com
70

AI Score

6.3

Confidence

High

EPSS

0.007

Percentile

80.9%

Security Advisory Description

A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.

A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set “H2Upgrade on” are unaffected by this issue.

A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes (‘/’), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.

Impact

There is no impact; F5 products are not affected by this vulnerability.