HTTP2: Apache httpd HTTP2 Cache-Digest Header Parsing Memory Corruption
This signature detects attempts to exploit a known vulnerability against Apache httpd. A successful attack can lead to arbitrary code execution.
Extended Description
Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.
Affected Products
Redhat enterprise_linux_eus
References
CVE: CVE-2020-9490
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Redhat
Fedoraproject
Opensuse
Oracle
Apache
Debian
Canonical
5.0