PT-2023-6292 · Apache +10 · Apache Http Server +10
David Warren
+1
·
Published
2023-10-12
·
Updated
2025-08-25
·
CVE-2023-45802
7.8
High
Base vector | Vector | AV:N/AC:L/Au:N/C:N/I:N/A:C |
Name of the Vulnerable Software and Affected Versions:
Apache HTTP Server versions prior to 2.4.58
Description:
The issue is related to the handling of HTTP/2 streams in the Apache HTTP Server. When a client resets an HTTP/2 stream using an RST frame, there is a time window where the request's memory resources are not immediately reclaimed. Instead, de-allocation is deferred until the connection is closed. A client can exploit this by sending new requests and resets, keeping the connection busy and open, and causing the memory footprint to grow. This can lead to a denial-of-service condition if the process runs out of memory before the connection is closed.
Recommendations:
To resolve the issue, upgrade to version 2.4.58 or later, which fixes the problem. As a temporary workaround, consider restricting the use of HTTP/2 streams or limiting the number of concurrent connections to minimize the risk of exploitation.
Exploit
Fix
RCE
Improper Resource Release
Resource Exhaustion
Related Identifiers
Affected Products
References · 135
- 🔥 https://github.com/icing/blog/blob/main/h2-rapid-reset.md#cve-2023-45802⭐ 43 🔗 4 · Exploit
- 🔥 https://github.com/lockness-Ko/CVE-2024-27316⭐ 14 🔗 3 · Exploit
- https://security-tracker.debian.org/tracker/DSA-5662-1 · Vendor Advisory
- https://osv.dev/vulnerability/SUSE-SU-2024:3961-1 · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2024-1938 · Vendor Advisory
- https://bdu.fstec.ru/vul/2024-03102 · Security Note
- https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47 · Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/718220 · Security Note
- https://linux.oracle.com/errata/ELSA-2024-3121.html · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795 · Security Note
- https://errata.almalinux.org/8/ALSA-2024-3121.html · Vendor Advisory
- https://osv.dev/vulnerability/openSUSE-SU-2024:13350-1 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802 · Security Note
- https://osv.dev/vulnerability/ALSA-2024:2368 · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2023-7243 · Vendor Advisory