CVE-2021-36160

Click the icon to Follow me:- twitterTelegramRedditDiscord

Summary:

A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).

Reference Links(if available):

  • http://httpd.apache.org/security/vulnerabilities_24.html
  • https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
  • https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
  • https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
  • https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
  • CVSS Score (if available)

    v2: / MEDIUMAV:N/AC:L/Au:N/C:N/I:N/A:P

    v3: / HIGHCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

    Links to Exploits(if available)

  • Available for Amazon Prime