Severity
7.5HIGH
EPSS
89.4%
top 0.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 4
Latest updateJul 29

Description

HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDapache/http_server2.4.172.4.59
Debianapache2< 2.4.59-1~deb11u1+3

Also affects: Ontap 9, Fedora 38, 39, 40

🔴Vulnerability Details

4
OSV
apache2 vulnerabilities2024-04-11
CVEList
Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames2024-04-04
OSV
CVE-2024-27316: HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response2024-04-04
GHSA
GHSA-5qc4-82jh-h385: HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response2024-04-04

📋Vendor Advisories

9
Apple
CVE-2024-27316: macOS Sonoma 14.62024-07-29
Oracle
Oracle Oracle Communications Applications Risk Matrix: Core (Apache HTTP Server) — CVE-2024-273162024-07-15
Ubuntu
Apache HTTP Server vulnerabilities2024-04-29
Ubuntu
Apache HTTP Server vulnerabilities2024-04-17
Ubuntu
Apache HTTP Server vulnerabilities2024-04-11

💬Community

1
HackerOne
Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames2024-04-24
CVE-2024-27316 (HIGH CVSS 7.5) | HTTP/2 incoming headers exceeding t | cvebase.io