Executive Summary

Title Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP1 Security Update
Name RHSA-2020:0251 First vendor Publication 2020-01-27
Vendor RedHat Last vendor Modification 2020-01-27
Severity (Vendor) N/A Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Problem Description:

Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 1 zip release for RHEL 6, RHEL 7 and Microsoft Windows is available.

Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.

This release adds the new Apache HTTP Server 2.4.37 Service Pack 1 packages that are part of the JBoss Core Services offering.

This release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.

Security fix(es):

* httpd: URL normalization inconsistency (CVE-2019-0220)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:


4. Bugs fixed (https://bugzilla.redhat.com/):

1695036 - CVE-2019-0220 httpd: URL normalization inconsistency

5. References:

https://access.redhat.com/security/cve/CVE-2019-0220 https://access.redhat.com/security/updates/classification/#low

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2020-0251.html

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-706 Use of Incorrectly-Resolved Name or Reference

CPE : Common Platform Enumeration

Application 244
Os 4
Os 2
Os 3
Os 2

Alert History

If you want to see full details history, please login or register.
Date Informations
2020-03-19 13:19:53
  • First insertion