• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Google Researcher Documented 3 Flaws In Apache Web Server Application

Google Researcher Documented 3 Flaws in Apache Web Server Application

You are here: Home / General Cyber Security News / Google Researcher Documented 3 Flaws in Apache Web Server Application
August 25, 2020


If your web-server operates on Apache, you really should straight away put in the most up-to-date offered version of the server application to avoid hackers from using unauthorized manage in excess of it.
Apache recently mounted various vulnerabilities in its web server computer software that could have possibly led to the execution of arbitrary code and, in specific eventualities, even could make it possible for attackers to lead to a crash and denial of company.
The flaws, tracked as CVE-2020-9490, CVE-2020-11984, CVE-2020-11993, were being uncovered by Felix Wilhelm of Google Undertaking Zero, and have considering the fact that been tackled by the Apache Basis in the most up-to-date variation of the software (2.4.46).cybersecurity
The very first of the 3 issues entail a attainable remote code execution vulnerability because of to a buffer overflow with the “mod_uwsgi” module (CVE-2020-11984), possibly allowing for an adversary to watch, alter, or delete sensitive details dependent on the privileges associated with an application managing on the server.
“[A] Malicious ask for may possibly result in details disclosure or [remote code execution] of an existing file on the server working less than a destructive method environment,” Apache pointed out.
A next flaw worries a vulnerability that is triggered when debugging is enabled in the “mod_http2” module (CVE-2020-11993), resulting in logging statements to be built on the completely wrong relationship and as a result ensuing in memory corruption owing to the concurrent log pool usage.
CVE-2020-9490, the most critical of the a few, also resides in the HTTP/2 module and uses a specifically crafted ‘Cache-Digest’ header to result in a memory corruption to lead to a crash and denial of services.
Cache Digest is section of a now-deserted web optimization function that aims to address an issue with server pushes — which will allow a server to preemptively send out responses to a shopper forward of time — by allowing the clientele to inform the server of their freshly cached contents so that bandwidth is not squandered in sending means that are previously in the client’s cache.
Consequently when a specifically crafted benefit is injected into the ‘Cache-Digest’ header in an HTTP/2 ask for, it would bring about a crash when the server sends a Force packet using the header. On unpatched servers, this issue can be settled by turning the HTTP/2 server press characteristic off.
Although there are presently no reports of these vulnerabilities being exploited in the wild, it is really necessary that the patches are used to susceptible methods immediately after proper screening as effectively as ensure that the software has been configured with only the essential permissions so as to mitigate the impact.

Found this short article intriguing? Adhere to THN on Facebook, Twitter  and LinkedIn to read far more exclusive articles we write-up.

Previous Post: «Homeland Security Announces 5g Tactic To Regulate The Pending Digital Homeland Security announces 5G tactic to regulate the pending digital overhaul
Next Post: Malicious Actors Impersonating Bitcoin Platform to Launch Malware Attacks Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.