Apache HTTP Server 2.4.66 Buffer Over-Read Vulnerability
CVE-2026-34059 Published on May 4, 2026
Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in ajp_parse_data()
Buffer Over-read vulnerability in Apache HTTP Server.
This issue affects Apache HTTP Server: through 2.4.66.
Users are recommended to upgrade to version 2.4.67, which fixes the issue.
Vulnerability Analysis
CVE-2026-34059 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Timeline
Report received
fixed in 2.4.x by r1933346 45 days later.
Weakness Type
Buffer Over-read
The software reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer. This typically occurs when the pointer or its index is incremented to a position beyond the bounds of the buffer or when pointer arithmetic results in a position outside of the valid memory location to name a few. This may result in exposure of sensitive information or possibly a crash.
Products Associated with CVE-2026-34059
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2026-34059 are published in these products:
Affected Versions
Apache Software Foundation Apache HTTP Server:- Before and including 2.4.66 is affected.