SB2019030609 - OpenSUSE Linux update for apache2
Published: March 6, 2019 Updated: April 26, 2019
Security Bulletin ID
SB2019030609
Severity
Medium
Patch available
YES
Number of vulnerabilities
2
Exploitation vector
Remote access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2018-17189)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to an error when handling malicious input. A remote attacker can send a specially crafted request bodies in a slow loris way to plain resources and cause the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data.
2) Security restrictions bypass (CVE-ID: CVE-2018-17199)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to mod_session checks the session expiry time before decoding the session. A remote attacker сan cause session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded and reuse old session credentials or session IDs, which the attacker could use to access web pages previously accessed by a targeted user.
Remediation
Install update from vendor's website.