Vulnerability Name:

CVE-2020-13950 (CCN-203462)

Assigned:2020-06-08
Published:2021-06-01
Updated:2021-12-01
Summary:Apache HTTP Server versions 2.4.41 to 2.4.46 mod_proxy_http can be made to crash (NULL pointer dereference) with specially crafted requests using both Content-Length and Transfer-Encoding headers, leading to a Denial of Service
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
3.2 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
7.5 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-476
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2020-13950

Source: CCN
Type: Apache Web site
low: mod_proxy_http NULL pointer dereference

Source: CONFIRM
Type: Vendor Advisory
N/A

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20210609 CVE-2020-13950: Apache httpd: mod_proxy_http NULL pointer dereference

Source: XF
Type: UNKNOWN
apache-cve202013950-dos(203462)

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-dev] 20210610 Re: svn commit: r1890598 - in /httpd/site/trunk/content/security/json: CVE-2019-17567.json CVE-2020-13938.json CVE-2020-13950.json CVE-2020-35452.json CVE-2021-26690.json CVE-2021-26691.json CVE-2021-30641.json CVE-2021-31618.json

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-announce] 20210609 CVE-2020-13950: mod_proxy_http NULL pointer dereference

Source: CONFIRM
Type: Mailing List, Release Notes
N/A

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-dce7e7738e

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-e3f6dd670d

Source: CCN
Type: oss-sec Mailing List, Wed, 09 Jun 2021 23:11:00 +0200
CVE-2020-13950: Apache httpd: mod_proxy_http NULL pointer dereference

Source: GENTOO
Type: Third Party Advisory
GLSA-202107-38

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20210702-0001/

Source: CCN
Type: IBM Security Bulletin 6492615 (i)
Multiple vulnerabilities in Apache HTTP Server affect IBM i

Source: CCN
Type: IBM Security Bulletin 6541328 (Rational Build Forge)
IBM Rational Build Forge 8.0.x is affected by Apache HTTP Server version used in it. (CVE-2021-31618, CVE-2020-13950, CVE-2019-17567, CVE-2020-26691, CVE-2021-26690, CVE-2020-13938, CVE-2021-30641, CVE-2020-35452)

Source: CCN
Type: IBM Security Bulletin 6837587 (App Connect Enterprise Certified Container)
IBM App Connect Enterprise Certified Container DesignerAuthoring operands that use Mapping Assistance may be vulnerable to denial of service due to CVE-2020-13950

Source: CCN
Type: IBM Security Bulletin 6840315 (Power HMC)
Vulnerability in Apache HTTP (CVE-2020-13950) affects Power HMC

Source: CCN
Type: IBM Security Bulletin 6856409 (Cloud Pak for Security)
IBM Cloud Pak for Security includes components with multiple known vulnerabilities

Source: MISC
Type: Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2021.html

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:http_server:*:*:*:*:*:*:*:* (Version >= 2.4.41 and <= 2.4.46)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:35:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:http_server:2.4.41:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:2.4.43:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:2.4.46:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:rational_build_forge:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:hardware_management_console:9.2.950.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:4.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:5.0:*:*:*:lts:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.10.6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:8039
    P
    maven-3.8.6-150200.4.9.8 on GA media (Moderate)
    2023-06-20
    oval:org.opensuse.security:def:7434
    P
    apache2-2.4.51-150400.6.11.1 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:7971
    P
    libzypp-plugin-appdata-1.0.1+git.20230117-150500.1.2 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:7473
    P
    cryptsetup-2.4.3-150400.1.110 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:730
    P
    Security update for java-1_8_0-openj9 (Important)
    2022-09-06
    oval:org.opensuse.security:def:3631
    P
    Security update for pcre (Important)
    2022-07-12
    oval:org.opensuse.security:def:3463
    P
    cups-1.7.5-20.23.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3446
    P
    bluez-5.13-5.12.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:95093
    P
    apache2-devel-2.4.51-150400.4.6 on GA media (Moderate)
    2022-06-22
    oval:com.redhat.rhsa:def:20225163
    P
    RHSA-2022:5163: httpd:2.4 security update (Low)
    2022-06-22
    oval:org.opensuse.security:def:2862
    P
    apache2-2.4.51-150400.4.6 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:94558
    P
    gdk-pixbuf-devel-2.42.6-150400.3.8 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:94492
    P
    apache2-2.4.51-150400.4.6 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:6069
    P
    Security update for u-boot (Important)
    2022-06-13
    oval:org.opensuse.security:def:95298
    P
    Security update for containerd, docker (Important)
    2022-05-16
    oval:org.opensuse.security:def:102011
    P
    Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3) (Critical)
    2022-02-17
    oval:org.opensuse.security:def:101271
    P
    groovy-lib-2.4.21-3.3.2 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:111598
    P
    Security update for apache2 (Important)
    2021-07-10
    oval:org.opensuse.security:def:111453
    P
    Security update for apache2 (Important)
    2021-06-24
    oval:org.opensuse.security:def:68562
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:73842
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:1616
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:97131
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:99966
    P
    (Important)
    2021-06-22
    oval:org.opensuse.security:def:64720
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:108677
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:102742
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:69060
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:75907
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:5750
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:100302
    P
    (Important)
    2021-06-22
    oval:org.opensuse.security:def:96052
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:66839
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:117452
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:109408
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:99389
    P
    (Important)
    2021-06-22
    oval:org.opensuse.security:def:69128
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:76226
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:100630
    P
    (Important)
    2021-06-22
    oval:org.opensuse.security:def:67158
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:73657
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:118504
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:1472
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:99652
    P
    (Important)
    2021-06-22
    oval:org.opensuse.security:def:64535
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:107937
    P
    Security update for apache2 (Important)
    2021-06-22
    oval:org.opensuse.security:def:101461
    P
    Security update for apache2 (Important)
    2021-06-22
    BACK
    apache http server *
    debian debian linux 9.0
    debian debian linux 10.0
    fedoraproject fedora 34
    fedoraproject fedora 35
    oracle enterprise manager ops center 12.4.0.0
    oracle instantis enterprisetrack 17.1
    oracle instantis enterprisetrack 17.2
    oracle instantis enterprisetrack 17.3
    oracle zfs storage appliance kit 8.8
    apache http server 2.4.41
    apache http server 2.4.43
    apache http server 2.4.46
    ibm rational build forge 8.0
    ibm i 7.2
    ibm i 7.3
    ibm i 7.4
    ibm hardware management console 9.2.950.0
    ibm app connect enterprise certified container 4.1
    ibm app connect enterprise certified container 4.2
    ibm cloud pak for security 1.10.0.0
    ibm app connect enterprise certified container 5.0
    ibm cloud pak for security 1.10.6.0