# mod_md通过特制的请求造成核心转储从而导致拒绝服务漏洞
## 概述
通过精心设计的HTTP请求,`mod_md`挑战处理程序会解引用空指针,导致子进程崩溃。这可能会被用于对服务器进行拒绝服务(DoS)攻击。
## 影响版本
- 受影响版本:2.4.33
- 修复版本:2.4.34
## 细节
精心设计的HTTP请求会导致`mod_md`挑战处理程序解引用空指针,从而导致子进程崩溃。
## 影响
这种漏洞可以使攻击者通过DoS攻击来使服务器崩溃。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server. Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.33) | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2018/CVE-2018-8011.yaml | POC详情 |
标题: svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/-Apache Mail Archives -- 🔗来源链接
标签:mailing-listx_refsource_MLIST
神龙速读:
- **CVE List:** The screenshot lists multiple CVEs (Common Vulnerabilities and Exposures) affecting various versions of Apache HTTP Server 2.4. Each CVE is accompanied by details such as:
- CVE ID (e.g., CVE-2020-11287)
- Severity (e.g., important, moderate, low)
- Description of the vulnerability and its impact
- Affected versions (e.g., Apache HTTP Server 2.4.9 to 2.4.33)
- Mitigation or fix details
- **Vulnerability Details:** Each vulnerability has a detailed description explaining the flaw, its potential impact, and the affected HTTP Server versions. For example:
- **CVE-2020-11287:** Important severity, affecting Apache HTTP Server 2.4.9 to 2.4.33. It describes a crash when using an `Accept-Language` value of 3 characters with the `AuthLDAPCharsetConfig` directive.
- **CVE-2020-11291:** Moderate severity, affecting Apache HTTP Server 2.4.32 to 2.4.34. It describes a memory leak in the openssl engine when handling certain client certificates.
- **Affected Versions:** The screenshot specifies the exact versions of Apache HTTP Server that are impacted by each vulnerability, allowing users to determine if their server is affected.
- **Fixes and Updates:** For each vulnerability, the screenshot provides information on the release that includes the fix, enabling users to update their servers accordingly.
- **Severity Ratings:** Each CVE is tagged with a severity level (important, moderate, low), helping users prioritize which vulnerabilities to address first.
- **Additional Notes:** The screenshot includes acknowledgments for individuals or organizations that discovered and reported the vulnerabilities, encouraging a collaborative approach to improving security.
标题: svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html-Apache Mail Archives -- 🔗来源链接
标签:mailing-listx_refsource_MLIST
神龙速读:
### 关键信息总结:
#### 1. 漏洞列表与影响:
- **CVE-2020-13938**: Improper Handling of Insufficient Privileges. Fixes an issue where unprivileged local users could stop httpd on Windows.
- **CVE-2021-31618**: NULL pointer dereference on specially crafted HTTP/2 request. Affects certain versions of Apache HTTP Server 2.4.x.
- **CVE-2019-17567**: mod_proxy_wstunnel tunneling of non-Upgrade authenticated or authorization possibly configured.
- **CVE-2020-13930**: mod_proxy_http NULL pointer dereference. Affects certain versions of Apache HTTP Server.
- **CVE-2020-13934**: APR pool mutex destruction crash. Affects Apache HTTP Server 2.4.39 and prior.
- **CVE-2016-10005**: ap_get_basic_auth_pw() Authentication Bypass. Affects certain versions of Apache HTTP Server.
#### 2. 影响范围:
- **Apache HTTP Server 2.4.x** versions have multiple vulnerabilities affecting availability, integrity, and confidentiality.
#### 3. 修复信息:
- **CVS updates** show fixes committed to the `staging` branch for various versions of Apache HTTP Server.
- **Acknowledgements** include contributions from various researchers and developers.
#### 4. 建议措施:
- **Update Apache HTTP Server** to the latest versions to mitigate identified vulnerabilities.
- **Monitor and log** for potential attacks and unauthorized access attempts.
- **Apply security patches** as soon as they are available to prevent exploitation of known vulnerabilities.
---
This summary highlights the most critical vulnerabilities, their impact, affected versions, and recommended actions based on the provided screenshot content.
暂无评论