{"id":"CVE-2016-8740","details":"The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request.","modified":"2026-04-11T05:01:02.172479Z","published":"2016-12-05T19:59:00.250Z","related":["SUSE-SU-2017:0203-1","openSUSE-SU-2024:10623-1"],"references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"},{"type":"WEB","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E"},{"type":"WEB","url":"https://support.apple.com/HT208221"},{"type":"WEB","url":"https://www.tenable.com/security/tns-2017-04"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1413"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180423-0001/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94650"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1161"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-36"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-1415.html"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037388"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1414"},{"type":"FIX","url":"https://github.com/apache/httpd/commit/29c63b786ae028d82405421585e91283c8fa0da3"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/140023/Apache-HTTPD-Web-Server-2.4.23-Memory-Exhaustion.html"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/40909/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/httpd","events":[{"introduced":"0"},{"last_affected":"47a9d8e8abf5697b4580c3ee2ade302b5c058fa6"},{"introduced":"0"},{"last_affected":"b7ef32c4957883ab17105fa82e6331bf48bed78a"},{"introduced":"0"},{"last_affected":"fd7b5c2c8b7549905ada63869757eac5c74d1c73"},{"introduced":"0"},{"last_affected":"6e65a7f3dadcade4274ae53f734d4c35188e3786"},{"introduced":"0"},{"last_affected":"a20d31be7d66d2f9bfeadfc23e54763b36abba08"},{"introduced":"0"},{"last_affected":"eabf29a378c3252811e0e88a77717e67b63c1c8b"},{"introduced":"0"},{"last_affected":"ef07cb031c6f8f7ac483c26fc858aad68c365fd9"},{"fixed":"29c63b786ae028d82405421585e91283c8fa0da3"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.4.17"},{"introduced":"0"},{"last_affected":"2.4.18"},{"introduced":"0"},{"last_affected":"2.4.19"},{"introduced":"0"},{"last_affected":"2.4.20"},{"introduced":"0"},{"last_affected":"2.4.21"},{"introduced":"0"},{"last_affected":"2.4.22"},{"introduced":"0"},{"last_affected":"2.4.23"}]}}],"versions":["2.4.17","2.4.18","2.4.19","2.4.20","2.4.21","2.4.22","2.4.23"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-8740.json","vanir_signatures_modified":"2026-04-11T05:01:02Z","vanir_signatures":[{"source":"https://github.com/apache/httpd/commit/29c63b786ae028d82405421585e91283c8fa0da3","signature_type":"Line","deprecated":false,"digest":{"threshold":0.9,"line_hashes":["244481023149475990456424850895476734125","168040519394189920969892210167506517800","139431050514121276237459091241647733530","284714966141694497850569737308043946749","154048304374484397059762233995036391183","219737829885307372509143401869068772761","290554099235531278015707942428858454509","169703350810207944164328355273129720536"]},"signature_version":"v1","id":"CVE-2016-8740-0be1a6b6","target":{"file":"modules/http2/h2_session.c"}},{"source":"https://github.com/apache/httpd/commit/29c63b786ae028d82405421585e91283c8fa0da3","signature_type":"Function","deprecated":false,"digest":{"length":1540,"function_hash":"101208191567229092215005179581469079528"},"signature_version":"v1","id":"CVE-2016-8740-10cf6e18","target":{"file":"modules/http2/h2_stream.c","function":"h2_stream_add_header"}},{"source":"https://github.com/apache/httpd/commit/29c63b786ae028d82405421585e91283c8fa0da3","signature_type":"Function","deprecated":false,"digest":{"length":746,"function_hash":"35133289215646842858268275242346878128"},"signature_version":"v1","id":"CVE-2016-8740-37cc2b20","target":{"file":"modules/http2/h2_session.c","function":"on_header_cb"}},{"source":"https://github.com/apache/httpd/commit/29c63b786ae028d82405421585e91283c8fa0da3","signature_type":"Line","deprecated":false,"digest":{"threshold":0.9,"line_hashes":["330812928712923097647431169060852349694","97962330718371112716733895949993495762","161288343024700098132977802419383077435","292267065053052929177953934748603888727","36057126629300946047816038563126389476","89957812090240971340612567678165689731","146205415267399968769228124982979820038","306884228181902485425325017978175973343","32905650322731696362541229059889047789","16379505148143251773312657069267948909","10851256074961049183059790553469473188","247713302117673057198521258381099537497","65748729280087126396730872948384230666","35988379571957043779869214937787771388","35513896102442032076111771610559934690","183361426703405195366100702376465548034","122740754188583041226320097802970122663","162023900025323705511919602298398980073","50951168893058211790274303055653784378","209968976316518048543613380668427410444","175176200539830981198336514731950225010","258029099397505074905860117525472594082","264116288663167832946635420571092014093","99838132887637535165142863012539037225","270406471116269501362211289259122509978","257597789389724016888757316377339413716","307873686065405842762111767971874098810","317363423084286711502866716741772912823","240434244231299267486927785493765036916","88216972723551032402518697086137787486","157853225052774601716563002210587479582","283479763512661529655883225390174471399","107648053937943838360533745631281501443","319312758995114045092221498424842029746","135088448420089307614680804757245164462","212127858969470162981989225298961726232","147026790061957939461555754947880946510"]},"signature_version":"v1","id":"CVE-2016-8740-8892a9f9","target":{"file":"modules/http2/h2_stream.c"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}