Описание
By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server. Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.33).
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 2.4.27-2ubuntu4.2 |
| bionic | not-affected | 2.4.29-1ubuntu4.2 |
| devel | released | 2.4.34-1ubuntu1 |
| esm-infra-legacy/trusty | not-affected | 2.4.7-1ubuntu4.20 |
| esm-infra/bionic | not-affected | 2.4.29-1ubuntu4.2 |
| esm-infra/xenial | not-affected | 2.4.18-2ubuntu3.9 |
| precise/esm | not-affected | |
| trusty | not-affected | 2.4.7-1ubuntu4.20 |
| trusty/esm | not-affected | 2.4.7-1ubuntu4.20 |
| upstream | released | 2.4.34 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server. Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.33).
By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server. Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.33).
By specially crafting HTTP requests, the mod_md challenge handler woul ...
Уязвимость обработчика задач mod_md веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
5 Medium
CVSS2
7.5 High
CVSS3