Vulnerability identifier: #VU17177
Vulnerability risk: Medium
Exploitation vector: Network
Exploit availability: No
Vendor: Apache Foundation
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to an error when handling malicious input. A remote attacker can send a specially crafted request bodies in a slow loris way to plain resources and cause the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data.
Update to version 2.4.38.
Vulnerable software versions
Apache HTTP Server: 2.4.17 - 2.4.37
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?