### [CVE-2016-8740](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8740) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20HTTP%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request. ### POC #### Reference - http://packetstormsecurity.com/files/140023/Apache-HTTPD-Web-Server-2.4.23-Memory-Exhaustion.html - https://www.exploit-db.com/exploits/40909/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/bioly230/THM_Skynet - https://github.com/jptr218/apachedos - https://github.com/lcfpadilha/mac0352-ep4 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough - https://github.com/vshaliii/DC-3-Vulnhub-Walkthrough