A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
06 Jun 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jun 2021, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2018-03-26 15:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-1301
Mitre link : CVE-2018-1301
CVE.ORG link : CVE-2018-1301
JSON object : View
Products Affected
debian
- debian_linux
netapp
- clustered_data_ontap
- storage_automation_store
- santricity_cloud_connector
- storagegrid
canonical
- ubuntu_linux
apache
- http_server
redhat
- enterprise_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer