A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set "H2Upgrade on" are unaffected by this issue.
{
"unresolved_ranges": [
{
"cpes": [
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "16.04"
},
{
"last_affected": "18.04"
},
{
"last_affected": "19.04"
}
],
"source": "CPE_FIELD",
"vendor_product": "canonical:ubuntu_linux"
},
{
"cpes": [
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "30"
}
],
"source": "CPE_FIELD",
"vendor_product": "fedoraproject:fedora"
},
{
"cpes": [
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "15.0"
},
{
"last_affected": "42.3"
}
],
"source": "CPE_FIELD",
"vendor_product": "opensuse:leap"
},
{
"cpes": [
"cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.0.0"
},
{
"last_affected": "8.1.0"
},
{
"last_affected": "8.1.1"
},
{
"last_affected": "8.2.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "oracle:communications_session_report_manager"
},
{
"cpes": [
"cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.0.0"
},
{
"last_affected": "8.1.0"
},
{
"last_affected": "8.1.1"
},
{
"last_affected": "8.2.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "oracle:communications_session_route_manager"
},
{
"cpes": [
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "12.3.3"
},
{
"last_affected": "12.4.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "oracle:enterprise_manager_ops_center"
},
{
"cpes": [
"cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "12.2.1.3.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "oracle:http_server"
},
{
"cpes": [
"cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "17.1"
},
{
"last_affected": "17.2"
},
{
"last_affected": "17.3"
}
],
"source": "CPE_FIELD",
"vendor_product": "oracle:instantis_enterprisetrack"
},
{
"cpes": [
"cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "7.0"
},
{
"last_affected": "7.1"
}
],
"source": "CPE_FIELD",
"vendor_product": "oracle:retail_xstore_point_of_service"
},
{
"cpes": [
"cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "1.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "redhat:jboss_core_services"
}
]
}