Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-41524

Опубликовано: 05 окт. 2021
Источник: debian
EPSS Низкий

Описание

While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.50-1package
apache2not-affectedbullseyepackage
apache2not-affectedbusterpackage
apache2not-affectedstretchpackage

Примечания

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-41524

  • Fixed by: https://svn.apache.org/r1893655

  • https://www.openwall.com/lists/oss-security/2021/10/05/1

EPSS

Процентиль: 91%
0.07103
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project.

CVSS3: 7.5
redhat
больше 4 лет назад

While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project.

CVSS3: 7.5
nvd
больше 4 лет назад

While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project.

CVSS3: 7.5
msrc
больше 4 лет назад

null pointer dereference in h2 fuzzing

CVSS3: 7.5
github
больше 3 лет назад

While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project.

EPSS

Процентиль: 91%
0.07103
Низкий