Логотип exploitDog
bind:"CVE-2021-32785"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-32785"

Количество 11

Количество 11

ubuntu логотип

CVE-2021-32785

больше 4 лет назад

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. When mod_auth_openidc versions prior to 2.4.9 are configured to use an unencrypted Redis cache (`OIDCCacheEncrypt off`, `OIDCSessionType server-cache`, `OIDCCacheType redis`), `mod_auth_openidc` wrongly performed argument interpolation before passing Redis requests to `hiredis`, which would perform it again and lead to an uncontrolled format string bug. Initial assessment shows that this bug does not appear to allow gaining arbitrary code execution, but can reliably provoke a denial of service by repeatedly crashing the Apache workers. This bug has been corrected in version 2.4.9 by performing argument interpolation only once, using the `hiredis` API. As a workaround, this vulnerability can be mitigated by setting `OIDCCacheEncrypt` to `on`, as cache keys are cryptographically hashed befo...

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2021-32785

больше 4 лет назад

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. When mod_auth_openidc versions prior to 2.4.9 are configured to use an unencrypted Redis cache (`OIDCCacheEncrypt off`, `OIDCSessionType server-cache`, `OIDCCacheType redis`), `mod_auth_openidc` wrongly performed argument interpolation before passing Redis requests to `hiredis`, which would perform it again and lead to an uncontrolled format string bug. Initial assessment shows that this bug does not appear to allow gaining arbitrary code execution, but can reliably provoke a denial of service by repeatedly crashing the Apache workers. This bug has been corrected in version 2.4.9 by performing argument interpolation only once, using the `hiredis` API. As a workaround, this vulnerability can be mitigated by setting `OIDCCacheEncrypt` to `on`, as cache keys are cryptographically hashed befo...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2021-32785

больше 4 лет назад

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. When mod_auth_openidc versions prior to 2.4.9 are configured to use an unencrypted Redis cache (`OIDCCacheEncrypt off`, `OIDCSessionType server-cache`, `OIDCCacheType redis`), `mod_auth_openidc` wrongly performed argument interpolation before passing Redis requests to `hiredis`, which would perform it again and lead to an uncontrolled format string bug. Initial assessment shows that this bug does not appear to allow gaining arbitrary code execution, but can reliably provoke a denial of service by repeatedly crashing the Apache workers. This bug has been corrected in version 2.4.9 by performing argument interpolation only once, using the `hiredis` API. As a workaround, this vulnerability can be mitigated by setting `OIDCCacheEncrypt` to `on`, as cache keys are cryptographically hashed before

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2021-32785

около 4 лет назад

Format string bug in the Redis cache implementation

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2021-32785

больше 4 лет назад

mod_auth_openidc is an authentication/authorization module for the Apa ...

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2021-05111

больше 4 лет назад

Уязвимость модуля аутентификации/авторизации для HTTP-сервера Apache mod_auth_openidc, связанная с использованием неконтролируемых форматных строк, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:3020-1

больше 4 лет назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1277-1

больше 4 лет назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3020-1

больше 4 лет назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3352-1

больше 4 лет назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4532-1

около 1 месяца назад

Security update for apache2-mod_auth_openidc

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-32785

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. When mod_auth_openidc versions prior to 2.4.9 are configured to use an unencrypted Redis cache (`OIDCCacheEncrypt off`, `OIDCSessionType server-cache`, `OIDCCacheType redis`), `mod_auth_openidc` wrongly performed argument interpolation before passing Redis requests to `hiredis`, which would perform it again and lead to an uncontrolled format string bug. Initial assessment shows that this bug does not appear to allow gaining arbitrary code execution, but can reliably provoke a denial of service by repeatedly crashing the Apache workers. This bug has been corrected in version 2.4.9 by performing argument interpolation only once, using the `hiredis` API. As a workaround, this vulnerability can be mitigated by setting `OIDCCacheEncrypt` to `on`, as cache keys are cryptographically hashed befo...

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-32785

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. When mod_auth_openidc versions prior to 2.4.9 are configured to use an unencrypted Redis cache (`OIDCCacheEncrypt off`, `OIDCSessionType server-cache`, `OIDCCacheType redis`), `mod_auth_openidc` wrongly performed argument interpolation before passing Redis requests to `hiredis`, which would perform it again and lead to an uncontrolled format string bug. Initial assessment shows that this bug does not appear to allow gaining arbitrary code execution, but can reliably provoke a denial of service by repeatedly crashing the Apache workers. This bug has been corrected in version 2.4.9 by performing argument interpolation only once, using the `hiredis` API. As a workaround, this vulnerability can be mitigated by setting `OIDCCacheEncrypt` to `on`, as cache keys are cryptographically hashed befo...

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-32785

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. When mod_auth_openidc versions prior to 2.4.9 are configured to use an unencrypted Redis cache (`OIDCCacheEncrypt off`, `OIDCSessionType server-cache`, `OIDCCacheType redis`), `mod_auth_openidc` wrongly performed argument interpolation before passing Redis requests to `hiredis`, which would perform it again and lead to an uncontrolled format string bug. Initial assessment shows that this bug does not appear to allow gaining arbitrary code execution, but can reliably provoke a denial of service by repeatedly crashing the Apache workers. This bug has been corrected in version 2.4.9 by performing argument interpolation only once, using the `hiredis` API. As a workaround, this vulnerability can be mitigated by setting `OIDCCacheEncrypt` to `on`, as cache keys are cryptographically hashed before

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-32785

Format string bug in the Redis cache implementation

CVSS3: 7.5
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-32785

mod_auth_openidc is an authentication/authorization module for the Apa ...

CVSS3: 5.3
0%
Низкий
больше 4 лет назад
fstec логотип
BDU:2021-05111

Уязвимость модуля аутентификации/авторизации для HTTP-сервера Apache mod_auth_openidc, связанная с использованием неконтролируемых форматных строк, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:3020-1

Security update for apache2-mod_auth_openidc

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1277-1

Security update for apache2-mod_auth_openidc

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3020-1

Security update for apache2-mod_auth_openidc

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3352-1

Security update for apache2-mod_auth_openidc

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2025:4532-1

Security update for apache2-mod_auth_openidc

около 1 месяца назад

Уязвимостей на страницу