Описание
In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2.4.25-3ubuntu2 |
| esm-infra-legacy/trusty | released | 2.4.7-1ubuntu4.15 |
| esm-infra/xenial | released | 2.4.18-2ubuntu3.2 |
| precise | not-affected | 2.2.22-1ubuntu1.11 |
| trusty | released | 2.4.7-1ubuntu4.15 |
| trusty/esm | released | 2.4.7-1ubuntu4.15 |
| upstream | released | 2.4.25-1 |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE | |
| xenial | released | 2.4.18-2ubuntu3.2 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod ...
In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
Уязвимость модуля mod_auth_digest веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать аварийное завершение работы сервера
EPSS
5 Medium
CVSS2
7.5 High
CVSS3