<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HTTP/2 CONTINUATION Flood - Apache Servers are vulnerable in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/HTTP-2-CONTINUATION-Flood-Apache-Servers-are-vulnerable/m-p/210829#M34915</link>
    <description>&lt;P&gt;Hi team,&lt;/P&gt;
&lt;P&gt;The "CONTINUATION Flood" vulnerability has been recently disclosed on a webserver that supports HTTP/2.0. After conducting a swift verification, it appears that all the Apache server versions used by Check Point are affected by this vulnerability. However, upon verifying the multiportals on R81.10 at least, it was found that it does not support HTTP/2.0, ensuring our safety in this regard.&lt;/P&gt;
&lt;P&gt;Since I do not have R81.20 can any one confirm? Or someone from CheckPoint staff can confirm?&lt;/P&gt;
&lt;P&gt;This is from R81.10&lt;/P&gt;
&lt;P&gt;/web/cpshared/web/Apache/2.2.0/bin/httpd2 -v&lt;BR /&gt;Server version: CPWS/2.4.55 (Unix)&lt;BR /&gt;Server built: Apr 4 2023 13:08:25&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nowotarski.info/http2-continuation-flood/" target="_blank"&gt;https://nowotarski.info/http2-continuation-flood/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/new-http-2-dos-attack-can-crash-web-servers-with-a-single-connection/" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/new-http-2-dos-attack-can-crash-web-servers-with-a-single-connection/&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;</description>
    <pubDate>Tue, 09 Apr 2024 12:28:09 GMT</pubDate>
    <dc:creator>Blason_R</dc:creator>
    <dc:date>2024-04-09T12:28:09Z</dc:date>
    <item>
      <title>HTTP/2 CONTINUATION Flood - Apache Servers are vulnerable</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-2-CONTINUATION-Flood-Apache-Servers-are-vulnerable/m-p/210829#M34915</link>
      <description>&lt;P&gt;Hi team,&lt;/P&gt;
&lt;P&gt;The "CONTINUATION Flood" vulnerability has been recently disclosed on a webserver that supports HTTP/2.0. After conducting a swift verification, it appears that all the Apache server versions used by Check Point are affected by this vulnerability. However, upon verifying the multiportals on R81.10 at least, it was found that it does not support HTTP/2.0, ensuring our safety in this regard.&lt;/P&gt;
&lt;P&gt;Since I do not have R81.20 can any one confirm? Or someone from CheckPoint staff can confirm?&lt;/P&gt;
&lt;P&gt;This is from R81.10&lt;/P&gt;
&lt;P&gt;/web/cpshared/web/Apache/2.2.0/bin/httpd2 -v&lt;BR /&gt;Server version: CPWS/2.4.55 (Unix)&lt;BR /&gt;Server built: Apr 4 2023 13:08:25&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nowotarski.info/http2-continuation-flood/" target="_blank"&gt;https://nowotarski.info/http2-continuation-flood/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/new-http-2-dos-attack-can-crash-web-servers-with-a-single-connection/" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/new-http-2-dos-attack-can-crash-web-servers-with-a-single-connection/&lt;/A&gt;&lt;/P&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;</description>
      <pubDate>Tue, 09 Apr 2024 12:28:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-2-CONTINUATION-Flood-Apache-Servers-are-vulnerable/m-p/210829#M34915</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2024-04-09T12:28:09Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP/2 CONTINUATION Flood - Apache Servers are vulnerable</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-2-CONTINUATION-Flood-Apache-Servers-are-vulnerable/m-p/210831#M34916</link>
      <description>&lt;PRE&gt;#&amp;nbsp;ver&lt;BR /&gt;Product version Check Point Gaia R81.20&lt;BR /&gt;OS build 627&lt;BR /&gt;OS kernel version 3.10.0-1160.15.2cpx86_64&lt;BR /&gt;OS edition 64-bit&lt;/PRE&gt;
&lt;PRE&gt;[Expert]# /web/cpshared/web/Apache/2.2.0/bin/httpd2 -v&lt;BR /&gt;Server version: CPWS/2.4.55 (Unix)&lt;BR /&gt;Server built: Mar 5 2024 22:51:39&lt;/PRE&gt;</description>
      <pubDate>Tue, 09 Apr 2024 12:32:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-2-CONTINUATION-Flood-Apache-Servers-are-vulnerable/m-p/210831#M34916</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-04-09T12:32:53Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP/2 CONTINUATION Flood - Apache Servers are vulnerable</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-2-CONTINUATION-Flood-Apache-Servers-are-vulnerable/m-p/210833#M34917</link>
      <description>&lt;P&gt;Ok so R81.20 is from the affected versions as well.&lt;/P&gt;
&lt;P&gt;Does it support Http/2.0? This can be found from Chrome -&amp;gt; Developer Tools&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="e.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25213iEC5851004C6C1521/image-size/large?v=v2&amp;amp;px=999" role="button" title="e.png" alt="e.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 12:34:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-2-CONTINUATION-Flood-Apache-Servers-are-vulnerable/m-p/210833#M34917</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2024-04-09T12:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP/2 CONTINUATION Flood - Apache Servers are vulnerable</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-2-CONTINUATION-Flood-Apache-Servers-are-vulnerable/m-p/210834#M34918</link>
      <description>&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk180257" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk180257&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 12:39:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-2-CONTINUATION-Flood-Apache-Servers-are-vulnerable/m-p/210834#M34918</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-04-09T12:39:01Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP/2 CONTINUATION Flood - Apache Servers are vulnerable</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-2-CONTINUATION-Flood-Apache-Servers-are-vulnerable/m-p/210842#M34920</link>
      <description>&lt;P&gt;That is great so we are safe here.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 12:59:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-2-CONTINUATION-Flood-Apache-Servers-are-vulnerable/m-p/210842#M34920</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2024-04-09T12:59:13Z</dc:date>
    </item>
  </channel>
</rss>

