• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Google Researcher Documented 3 Flaws In Apache Web Server Application

Google Researcher Documented 3 Flaws in Apache Web Server Application

You are here: Home / General Cyber Security News / Google Researcher Documented 3 Flaws in Apache Web Server Application
August 25, 2020


If your web-server operates on Apache, you really should straight away put in the most up-to-date offered version of the server application to avoid hackers from using unauthorized manage in excess of it.
Apache recently mounted various vulnerabilities in its web server computer software that could have possibly led to the execution of arbitrary code and, in specific eventualities, even could make it possible for attackers to lead to a crash and denial of company.
The flaws, tracked as CVE-2020-9490, CVE-2020-11984, CVE-2020-11993, were being uncovered by Felix Wilhelm of Google Undertaking Zero, and have considering the fact that been tackled by the Apache Basis in the most up-to-date variation of the software (2.4.46).cybersecurity
The very first of the 3 issues entail a attainable remote code execution vulnerability because of to a buffer overflow with the “mod_uwsgi” module (CVE-2020-11984), possibly allowing for an adversary to watch, alter, or delete sensitive details dependent on the privileges associated with an application managing on the server.
“[A] Malicious ask for may possibly result in details disclosure or [remote code execution] of an existing file on the server working less than a destructive method environment,” Apache pointed out.
A next flaw worries a vulnerability that is triggered when debugging is enabled in the “mod_http2” module (CVE-2020-11993), resulting in logging statements to be built on the completely wrong relationship and as a result ensuing in memory corruption owing to the concurrent log pool usage.
CVE-2020-9490, the most critical of the a few, also resides in the HTTP/2 module and uses a specifically crafted ‘Cache-Digest’ header to result in a memory corruption to lead to a crash and denial of services.
Cache Digest is section of a now-deserted web optimization function that aims to address an issue with server pushes — which will allow a server to preemptively send out responses to a shopper forward of time — by allowing the clientele to inform the server of their freshly cached contents so that bandwidth is not squandered in sending means that are previously in the client’s cache.
Consequently when a specifically crafted benefit is injected into the ‘Cache-Digest’ header in an HTTP/2 ask for, it would bring about a crash when the server sends a Force packet using the header. On unpatched servers, this issue can be settled by turning the HTTP/2 server press characteristic off.
Although there are presently no reports of these vulnerabilities being exploited in the wild, it is really necessary that the patches are used to susceptible methods immediately after proper screening as effectively as ensure that the software has been configured with only the essential permissions so as to mitigate the impact.

Found this short article intriguing? Adhere to THN on Facebook, Twitter  and LinkedIn to read far more exclusive articles we write-up.

Previous Post: «Homeland Security Announces 5g Tactic To Regulate The Pending Digital Homeland Security announces 5G tactic to regulate the pending digital overhaul
Next Post: Malicious Actors Impersonating Bitcoin Platform to Launch Malware Attacks Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.