Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319

Blog

Apache HTTP Server fixes crucial security flaws

Image Description

The Apache Software Foundation has put out a new update to address two flaws that could be exploited by a remote attacker to take control of a vulnerable system running in its popular web server.

The flaws, tracked as CVE-2021-44790 and CVE-2021-44224, have CVSS scores of 9.8 and 8.2 respectively. Although the more severe flaw in Apache's web server has a critical rating, it's still ranked below Log4Shell which has a CVSS score of 10 out of 10.

The first flaw is a memory-related buffer overflow that affects Apache HTTP Server 2.4.5.1 and earlier versions while the second flaw can be used to achieve server side request forgery in Apache HTTP Server 2.47 up to 2.4.51.

Patching these two flaws in Apache's web server should be a top priority for site owners due to the fact that Apache HTTP Server's popularity worldwide makes vulnerable systems a prime target for hackers.

Potential to be weaponized

In a new alert sent out by the Cybersecurity and Infrastructure Security Agency (CISA), the US government agency warns that the buffer overflow flaw in Apache Web server could “allow a remote attacker to take control of an affected system”.

Although this critical bug has been used in any exploits in the wild yet, the Apache HTTPD team believes that it could be weaponized by an attacker.

For this reason, organizations and individuals running Apache HTTP Server should check out this announcement and update the software to the latest version as soon as possible to protect themselves from any potential attacks exploiting this critical flaw. 

We've also rounded up the best endpoint protection software and best firewall

Via ZDNet

Date

23 Dec 2021

Sources


Share


Other Blog

  • Google is making it easier for retailers to promote their holiday deals

    Faster approval times and improved editing features mean more consumers will see retailer's promotions on Google this holiday season.

    Read More
  • You can use LG's new UltraGear Gaming Speaker for team chat instead of headsets

    After its unveiling at CES 2021, LG has finally put a release window to its brand-new gaming soundbar.

    Read More
  • Windows 10 apps abused by BazarLoader 'call me back' attack

    A new attack campaign abuses the appxbundle format used by the Windows 10 app installer, in order to deliver malware via highly targeted spam campaigns, shares researchers.

    Cybersecurity sleuths from Sophos said they became aware of the campaign after one of its own employees was targeted with the spam email that used social engineering techniques to get victims to open a URL.

    Through a novel delivery mechanism, the link led to a malicious payload, which the researchers claim belongs to a malware family variously known as BazarBackdoor and BazarLoader, in order to prep the victim’s computer for future attacks.

    TechRadar needs you!

    We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

    >> Click here to start the survey in a new window

    Novel delivery mechanism

    In their breakdown of the delivery mechanism, the researchers note that instead of directing potential victims to a website, the phishing lure instead asks the web browser to invoke a tool that’s used by the Windows Store application, called AppInstaller.exe, to download and execute “whatever’s on the other end of that link.”

    The researchers note that the attackers used two different web addresses for hosting this fake page in Microsoft’s cloud storage service, most likely in a bid to lend it some authenticity.

    Once the campaign manages to install the BazarBackdoor malware it profiles the system, identifies its public facing IP address, and relays this information to its command and control (C2) server. The backdoor is now all set to receive further malicious payloads.

    “Spamming a security company with malicious emails featuring a novel attack technique might not have been the best decision by the operators,” said Andrew Brandt, principal researcher at Sophos.

    He adds that malware that comes in application installer bundles is not commonly seen in attacks. However, now that the technique has been demonstrated, the researchers expect it to “attract wider interest” from both sides of the fence. 

    Protect your computers against all kinds of cyber-attacks with these best endpoint protection tools

    Read More
  • 3 reasons why Amazon may make a foldable Kindle

    Amazon is reportedly considering a foldable Kindle, but would that be a good idea? Here are our thoughts.

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us