緊急: kusanagi-httpd24 脆弱性情報

概要

公開日時 2026-05-11
深刻度 緊急
モジュール kusanagi-httpd24
対象 KUSANAGI 9, Business Edition, Page Speed Technology, Security Edition

脆弱性情報

kusanagi-httpd24の脆弱性情報を公開しました。修正した脆弱性は以下の通りとなります。

  • CVE-2026-34059: Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in ajp_parse_data() (cve.mitre.org) Buffer Over-read vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue. Credits: Elhanan Haenel
  • CVE-2026-34032: Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string) (cve.mitre.org) Improper Null Termination, Out-of-bounds Read vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue. Credits: Tianshuo Han (hantianshuo233@gmail.com)
  • CVE-2026-33857: Apache HTTP Server: Off-by-one OOB reads in AJP getter functions (cve.mitre.org) Out-of-bounds Read vulnerability in mod_proxy_ajp of Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue. Credits: Elhanan Haenel
  • CVE-2026-33523: Apache HTTP Server: multiple modules: HTTP response splitting forwarding malicious status line (cve.mitre.org) HTTP response splitting vulnerability in multiple Apache HTTP Server modules with untrusted or compromised backend servers. This issue affects Apache HTTP Server: from through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue. Credits: Haruki Oyama (Waseda University)
  • CVE-2026-33007: Apache HTTP Server: mod_authn_socache crash (cve.mitre.org) A NULL pointer dereference in the mod_authn_socache in Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote user to crash a child process in a caching forward proxy configuration. Users are recommended to upgrade to version 2.4.67, which fixes this issue. Credits: Pavel Kohout, Aisle Research, Aisle.com
  • CVE-2026-33006: Apache HTTP Server: mod_auth_digest timing attack (cve.mitre.org) A timing attack against mod_auth_digest in Apache HTTP Server 2.4.66 allows a bypass of Digest authentication by a remote attacker. Users are recommended to upgrade to version 2.4.67, which fixes this issue. Credits: Nitescu Lucian
  • CVE-2026-29169: Apache HTTP Server: mod_dav_lock indirect lock crash (cve.mitre.org) A NULL pointer dereference in mod_dav_lock in Apache HTTP Server 2.4.66 and earlier may allow an attacker to crash the server with a malicious request.mod_dav_lock is not used internally by mod_dav or mod_dav_fs. The only known use-case for mod_dav_lock was mod_dav_svn from Apache Subversion earlier than version 1.2.0. Users are recommended to upgrade to version 2.4.66, which fixes this issue, or remove mod_dav_lock. Credits: Pavel Kohout, Aisle Research, Aisle.com
  • CVE-2026-29168: Apache HTTP Server: mod_md unrestricted OCSP response (cve.mitre.org) Allocation of Resources Without Limits or Throttling vulnerability in Apache HTTP Server's  mod_md via OCSP response data. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue. Credits: Pavel Kohout, Aisle Research, Aisle.com
  • CVE-2026-28780: Apache HTTP Server: buffer overflow in mod_proxy_ajp via ajp_msg_check_header() (cve.mitre.org) Heap-based Buffer Overflow vulnerability in mod_proxy_ajp of Apache HTTP Server. If mod_proxy_ajp connects to a malicious AJP server this AJP server can send a malicious AJP message back to mod_proxy_ajp and cause it to write 4 attacker controlled bytes after the end of a heap based buffer. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue. Credits: Andrew Lacambra
  • CVE-2026-24072: Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr (cve.mitre.org) An escalation of privilege bug in various modules in Apache HTTP 2.4.66 and earlier allows local .htaccess authors to read files with the privileges of the httpd user. Users are recommended to upgrade to version 2.4.67, which fixes this issue. Credits: y7syeu
  • CVE-2026-23918: Apache HTTP Server: http2: double free and possible RCE on early reset (cve.mitre.org) Double Free and possible RCE vulnerability in Apache HTTP Server with the HTTP/2 protocol. This issue affects Apache HTTP Server: 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue. Credits: Bartlomiej Dmitruk, striga.ai

CVE詳細

CVSSスコアや脆弱性の報告者等、詳細については、以下の情報を参照してください。
なお、CVEの状況によっては情報がまだ公開されていない場合があります。

アップデートしたパッケージ

This product uses the NVD API but is not endorsed or certified by the NVD.