Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1301

Опубликовано: 21 мар. 2018
Источник: redhat
CVSS3: 3.7

Описание

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5httpdWill not fix
Red Hat Enterprise Linux 6httpdFix deferred
Red Hat Enterprise Linux 8httpdNot affected
Red Hat JBoss Enterprise Web Server 2httpdWill not fix
Red Hat JBoss Web Server 3httpdNot affected
Red Hat Mobile Application Platform 4rhmap-httpd-dockerWill not fix
JBoss Core Services on RHEL 6jbcs-httpd24FixedRHSA-2019:036718.02.2019
JBoss Core Services on RHEL 6jbcs-httpd24-apache-commons-daemon-jsvcFixedRHSA-2019:036718.02.2019
JBoss Core Services on RHEL 6jbcs-httpd24-aprFixedRHSA-2019:036718.02.2019
JBoss Core Services on RHEL 6jbcs-httpd24-apr-utilFixedRHSA-2019:036718.02.2019

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1560643httpd: Out of bounds access after failure in reading the HTTP request

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 7 лет назад

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

CVSS3: 5.9
nvd
около 7 лет назад

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

CVSS3: 5.9
debian
около 7 лет назад

A specially crafted request could have crashed the Apache HTTP Server ...

CVSS3: 5.9
github
около 3 лет назад

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

CVSS3: 3.7
fstec
около 7 лет назад

Уязвимость веб-сервера Apache HTTP Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

3.7 Low

CVSS3