Apache Web Server Bug: Local Root Exploit on Apache HTTP Version 2.4.17 to 2.4.38

This week, the Apache Software Foundation has made an announcement that revealing a major security vulnerability/exploit where servers running in Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38.

Apache Web Server Bug: Local Root Exploit on Apache HTTP Version 2.4.17 to 2.4.38

According to the Apache team, the vulnerability, tracked as CVE-2019-0211, affects Apache web server releases for Unix systems only, from 2.4.17 to 2.4.38, and was fixed this week with the release of version 2.4.39. The non-Unix systems and LiteSpeed Web Server are not affected.

Along with this major flaw, two other control bypass security vulnerabilities and three less severe flaws which potentially could have led to normalization inconsistency issues and crashes were also patched with the Apache HTTP Server 2.4.39 release.

More Details:

According to an analysis conducted by Rapid7 Labs, more than 2,000,000 servers, many on public cloud platforms, are still running vulnerable versions of Apache. Most of the flawed systems are in the United States (~770,000), Germany (~224,000), and France (~111,000).

Apache Web Server Bug: Local Root Exploit on Apache HTTP Version 2.4.17 to 2.4.38

As you can see, there are many servers of Amazon AWS, DigitalOcean, OVH and others are affected by this serious security error. So if your server using these versions of Apache, we did recommend updating as soon as possible. System administrators can run the following command lines to update your Apache server to the latest 2.4.39 version.

CentOS based server

yum -y update

Ubuntu 18.04, Ubuntu 16.04

Keep monitoring on Ubuntu CVE Tracker and update your system as soon as the OS vendor publishes vulnerability fix.

apt-get update && apt-get upgrade

Debian 9

According to Debian CVE-2019-0211 security tracker the vulnerability has been fixed in Apache 2.4.25-3+deb9u7. Run following command line to update your server and fix the issue.

apt-get update && apt-get upgrade

All servers using cPanal/WHM have been automatically upgraded. But you can do this manually by running:

yum -y update ea-apache24*

After update the Apache version, let recheck to ensure your current Apache version is 2.4.39 or higher, use the following command:

httpd -v


Hope this help!

Leave a Reply

Disclosure: (1) We may receive a commission throught external affiliate links if you choose to purchase the mentioned product in the post. (2) We are independently owned, and the opinions expressed here are our own.