Description
The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request.
Published: 2016-12-05
Score: 7.5 High
EPSS: 68.3% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
Link Providers
http://packetstormsecurity.com/files/140023/Apache-HTTPD-Web-Server-2.4.23-Memory-Exhaustion.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2017-1415.html cve-icon cve-icon
http://seclists.org/bugtraq/2016/Dec/3 cve-icon
http://www.securityfocus.com/bid/94650 cve-icon cve-icon
http://www.securitytracker.com/id/1037388 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1161 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1413 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1414 cve-icon cve-icon
https://github.com/apache/httpd/commit/29c63b786ae028d82405421585e91283c8fa0da3 cve-icon cve-icon
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us cve-icon cve-icon
https://httpd.apache.org/security/vulnerabilities_24.html cve-icon
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2016-8740 cve-icon
https://security.gentoo.org/glsa/201701-36 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20180423-0001/ cve-icon cve-icon
https://support.apple.com/HT208221 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2016-8740 cve-icon
https://www.exploit-db.com/exploits/40909/ cve-icon cve-icon
https://www.tenable.com/security/tns-2017-04 cve-icon cve-icon
History

No history.

Subscriptions

Apache Http Server
Redhat Jboss Core Services Rhel Software Collections
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-06T02:34:59.624Z

Reserved: 2016-10-18T00:00:00.000Z

Link: CVE-2016-8740

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2016-12-05T19:59:00.250

Modified: 2026-05-06T22:30:45.220

Link: CVE-2016-8740

cve-icon Redhat

Severity : Low

Publid Date: 2016-12-04T00:00:00Z

Links: CVE-2016-8740 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses