nghttp2 Temporarily Buffers Incoming Headers to Prevent Memory Exhaustion
CVE-2024-27316
Key Information:
- Vendor
- Apache
- Status
- Vendor
- CVE Published:
- 4 April 2024
Badges
Summary
A vulnerability exists in the nghttp2 component of Apache HTTP Server where incoming HTTP/2 headers exceeding specified limits are temporarily buffered. If a client continues to send headers without pause, it can lead to memory exhaustion due to the inability to effectively process excess data. This situation arises when the server attempts to generate an informative HTTP 413 response, but prolonged header submission can result in server instability and service interruption.
Affected Version(s)
Apache HTTP Server 2.4.17 <= 2.4.58
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published