Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1303

Опубликовано: 21 мар. 2018
Источник: redhat
CVSS3: 5.3
EPSS Средний

Описание

A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.

Отчет

The versions of httpd package shipped with Red Hat Enterprise Linux are by default configured in prefork MPM mode, which means that this flaw can result in a crash of child process. The main web server process will not be killed. Also, though the module is loaded by default, it needs to be specifically enabled in order to be exposed to the security flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5httpdNot affected
Red Hat Enterprise Linux 6httpdWill not fix
Red Hat Enterprise Linux 8httpdNot affected
Red Hat JBoss Enterprise Application Platform 5httpdNot affected
Red Hat JBoss Enterprise Application Platform 6httpdNot affected
Red Hat JBoss Enterprise Web Server 2httpdNot affected
Red Hat JBoss Web Server 3httpdNot affected
Red Hat Mobile Application Platform 4rhmap-httpd-dockerNot affected
JBoss Core Services on RHEL 6jbcs-httpd24FixedRHSA-2019:036718.02.2019
JBoss Core Services on RHEL 6jbcs-httpd24-apache-commons-daemon-jsvcFixedRHSA-2019:036718.02.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1560399httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS

EPSS

Процентиль: 97%
0.31173
Средний

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 7 лет назад

A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.

CVSS3: 7.5
nvd
около 7 лет назад

A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.

CVSS3: 7.5
debian
около 7 лет назад

A specially crafted HTTP request header could have crashed the Apache ...

CVSS3: 7.5
github
около 3 лет назад

A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.

CVSS3: 5.3
fstec
около 7 лет назад

Уязвимость модуля mod_cache_socache веб-сервера Apache HTTP Server, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 97%
0.31173
Средний

5.3 Medium

CVSS3