Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1302

Опубликовано: 26 мар. 2018
Источник: debian
EPSS Средний

Описание

When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.33-1package
apache2fixed2.4.25-3+deb9u5stretchpackage
apache2not-affectedjessiepackage
apache2not-affectedwheezypackage

Примечания

  • HTTP/2 support introduced in 2.4.17

  • https://www.openwall.com/lists/oss-security/2018/03/24/5

EPSS

Процентиль: 93%
0.11001
Средний

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 8 лет назад

When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.

CVSS3: 5.9
redhat
почти 8 лет назад

When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.

CVSS3: 5.9
nvd
почти 8 лет назад

When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.

CVSS3: 5.9
github
больше 3 лет назад

When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.

CVSS3: 5.3
fstec
почти 8 лет назад

Уязвимость потока HTTP/2 веб-сервера Apache HTTP Server, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 93%
0.11001
Средний