Логотип exploitDog
bind:CVE-2021-31618
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-31618

Количество 12

Количество 12

ubuntu логотип

CVE-2021-31618

больше 4 лет назад

Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2021-31618

больше 4 лет назад

Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2021-31618

больше 4 лет назад

Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.

CVSS3: 7.5
EPSS: Средний
msrc логотип

CVE-2021-31618

9 месяцев назад

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2021-31618

больше 4 лет назад

Apache HTTP Server protocol handler for the HTTP/2 protocol checks rec ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-4jq3-qrx6-87cc

больше 3 лет назад

Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2021-03952

почти 5 лет назад

Уязвимость реализации протокола HTTP/2 модуля mod_http2 веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2021:2006-1

больше 4 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:2127-1

больше 4 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0908-1

больше 4 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2127-1

больше 4 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2004-1

больше 4 лет назад

Security update for apache2

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-31618

Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.

CVSS3: 7.5
19%
Средний
больше 4 лет назад
redhat логотип
CVE-2021-31618

Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.

CVSS3: 7.5
19%
Средний
больше 4 лет назад
nvd логотип
CVE-2021-31618

Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.

CVSS3: 7.5
19%
Средний
больше 4 лет назад
msrc логотип
CVSS3: 7.5
19%
Средний
9 месяцев назад
debian логотип
CVE-2021-31618

Apache HTTP Server protocol handler for the HTTP/2 protocol checks rec ...

CVSS3: 7.5
19%
Средний
больше 4 лет назад
github логотип
GHSA-4jq3-qrx6-87cc

Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.

CVSS3: 7.5
19%
Средний
больше 3 лет назад
fstec логотип
BDU:2021-03952

Уязвимость реализации протокола HTTP/2 модуля mod_http2 веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
19%
Средний
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:2006-1

Security update for apache2

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:2127-1

Security update for apache2

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0908-1

Security update for apache2

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2127-1

Security update for apache2

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2004-1

Security update for apache2

больше 4 лет назад

Уязвимостей на страницу