CVE-2019-0196

CWE-416Use After Free10 documents9 sources
Severity
5.3MEDIUM
EPSS
9.5%
top 7.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 11
Latest updateMay 24

Description

A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

NVDapache/http_server2.4.172.4.38
Debianapache2< 2.4.38-3+3

Also affects: Debian Linux 9.0, Ubuntu Linux 14.04, 16.04, 18.04, 18.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-vqc7-p7p7-97wf: A vulnerability was found in Apache HTTP Server 22022-05-24
CVEList
CVE-2019-0196: A vulnerability was found in Apache HTTP Server 22019-06-11
OSV
CVE-2019-0196: A vulnerability was found in Apache HTTP Server 22019-06-11

📋Vendor Advisories

3
Ubuntu
Apache HTTP Server vulnerabilities2019-04-04
Red Hat
httpd: mod_http2: read-after-free on a string compare2019-04-01
Debian
CVE-2019-0196: apache2 - A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed n...2019

💬Community

3
HackerOne
CVE-2019-0196: mod_http2 with scoreboard Use-After-Free (Read)2019-09-10
Bugzilla
CVE-2019-0196 mod_http2: httpd: mod_http2: read-after-free on a string compare [fedora-all]2019-04-04
Bugzilla
CVE-2019-0196 httpd: mod_http2: read-after-free on a string compare2019-04-02