Vulnerability Name:

CVE-2021-36160 (CCN-209524)

Assigned:2021-09-16
Published:2021-09-16
Updated:2022-10-18
Summary:A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): High
7.5 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
6.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-125
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2021-36160

Source: CCN
Type: Apache Web site
mod_proxy_uwsgi out of bound read

Source: MISC
Type: Release Notes, Vendor Advisory
http://httpd.apache.org/security/vulnerabilities_24.html

Source: XF
Type: UNKNOWN
apache-cve202136160-dos(209524)

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-bugs] 20211005 [Bug 65616] CVE-2021-36160 regression

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-bugs] 20211006 [Bug 65616] CVE-2021-36160 regression

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-bugs] 20211009 [Bug 65616] CVE-2021-36160 regression

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-bugs] 20211005 [Bug 65616] New: CVE-2021-36160 regression

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-bugs] 20211011 [Bug 65616] CVE-2021-36160 regression

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-bugs] 20211012 [Bug 65616] CVE-2021-36160 regression

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-cvs] 20210916 [httpd-site] branch main updated: Revert "Add descriptions for CVE-2021-33193 CVE-2021-36160"

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-cvs] 20210916 [httpd-site] branch main updated: Add descriptions for CVE-2021-33193 CVE-2021-36160

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20210929 [SECURITY] [DLA 2768-1] uwsgi security update

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20211020 [SECURITY] [DLA 2768-2] uwsgi regression update

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-dce7e7738e

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-e3f6dd670d

Source: GENTOO
Type: Third Party Advisory
GLSA-202208-20

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20211008-0004/

Source: CCN
Type: Cisco Security Advisory cisco-sa-apache-httpd-2.4.49-VWL69sWQ
Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021

Source: CISCO
Type: Third Party Advisory
20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021

Source: DEBIAN
Type: Third Party Advisory
DSA-4982

Source: CCN
Type: IBM Security Bulletin 6541320 (Rational Build Forge)
IBM Rational Build Forge 8.0.x is affected by Apache HTTP Server version used in it.(CVE-2021-36160)

Source: CCN
Type: IBM Security Bulletin 6618941 (Aspera Faspex)
IBM Aspera Faspex 4.4.2 has addressed multiple security vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6952347 (Aspera Orchestrator)
IBM Aspera Orchestrator affected by denial of service vulnerability (CVE-2021-36160)

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:http_server:*:*:*:*:*:*:*:* (Version >= 2.4.30 and <= 2.4.48)

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:35:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:11.0:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:netapp:cloud_backup:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:storagegrid:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:http_server:2.4.33:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:2.4.30:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:2.4.34:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:2.4.35:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:2.4.37:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:2.4.39:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:2.4.41:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:2.4.43:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:2.4.46:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:2.4.48:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:rational_build_forge:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:aspera_faspex:4.4.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7996
    P
    build-20230215-150200.15.1 on GA media (Moderate)
    2023-06-20
    oval:org.opensuse.security:def:8063
    P
    rpm-build-4.14.3-150300.55.1 on GA media (Moderate)
    2023-06-20
    oval:org.opensuse.security:def:7489
    P
    elfutils-0.185-150400.5.3.1 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:7434
    P
    apache2-2.4.51-150400.6.11.1 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:796
    P
    Security update for libgit2 (Important)
    2022-10-04
    oval:org.opensuse.security:def:95419
    P
    Security update for drbd (Important)
    2022-08-03
    oval:org.opensuse.security:def:3463
    P
    cups-1.7.5-20.23.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3510
    P
    groff-1.22.2-5.287 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3697
    P
    libvirt-5.1.0-11.10 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:94622
    P
    libXxf86vm-devel-1.1.4-1.23 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:94492
    P
    apache2-2.4.51-150400.4.6 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:95093
    P
    apache2-devel-2.4.51-150400.4.6 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:2862
    P
    apache2-2.4.51-150400.4.6 on GA media (Moderate)
    2022-06-22
    oval:com.redhat.rhsa:def:20221915
    P
    RHSA-2022:1915: httpd:2.4 security and bug fix update (Moderate)
    2022-05-10
    oval:org.opensuse.security:def:100057
    P
    (Moderate)
    2022-03-30
    oval:org.opensuse.security:def:98958
    P
    Security update for conmon, libcontainers-common, libseccomp, podman (Moderate)
    2022-03-04
    oval:org.opensuse.security:def:99746
    P
    (Critical)
    2022-02-11
    oval:org.opensuse.security:def:111117
    P
    Security update for apache2 (Important)
    2021-11-02
    oval:org.opensuse.security:def:6211
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:66960
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:102068
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:102132
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:118529
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:69152
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:1488
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:76368
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:100007
    P
    (Important)
    2021-10-26
    oval:org.opensuse.security:def:108001
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:111763
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:67300
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:102216
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:73721
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:102767
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:1640
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:64599
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:100343
    P
    (Important)
    2021-10-26
    oval:org.opensuse.security:def:108798
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:68578
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:73908
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:99154
    P
    (Important)
    2021-10-26
    oval:org.opensuse.security:def:5871
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:64786
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:100672
    P
    (Important)
    2021-10-26
    oval:org.opensuse.security:def:101335
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:96077
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:109433
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:117515
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:69085
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:76028
    P
    Security update for apache2 (Important)
    2021-10-26
    oval:org.opensuse.security:def:99689
    P
    (Important)
    2021-10-26
    oval:org.opensuse.security:def:99153
    P
    (Important)
    2021-10-25
    oval:org.opensuse.security:def:9407
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:99547
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:92796
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:106723
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:69937
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:10348
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:8660
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:92203
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:106038
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:9598
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:70301
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:8847
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:92398
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:106237
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:69547
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:9797
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:70488
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:105648
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:9042
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:99348
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:92597
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:106436
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:69738
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:10161
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:92008
    P
    Security update for apache2 (Important)
    2021-10-12
    oval:org.opensuse.security:def:105843
    P
    Security update for apache2 (Important)
    2021-10-12
    BACK
    apache http server *
    fedoraproject fedora 34
    fedoraproject fedora 35
    debian debian linux 9.0
    debian debian linux 10.0
    debian debian linux 11.0
    netapp cloud backup -
    netapp storagegrid -
    netapp clustered data ontap -
    oracle http server 12.2.1.3.0
    oracle instantis enterprisetrack 17.1
    oracle instantis enterprisetrack 17.2
    oracle instantis enterprisetrack 17.3
    oracle peoplesoft enterprise peopletools 8.58
    oracle enterprise manager base platform 13.4.0.0
    oracle http server 12.2.1.4.0
    oracle zfs storage appliance kit 8.8
    oracle enterprise manager base platform 13.5.0.0
    oracle communications cloud native core network function cloud native environment 1.10.0
    broadcom brocade fabric operating system firmware -
    apache http server 2.4.33
    apache http server 2.4.30
    apache http server 2.4.34
    apache http server 2.4.35
    apache http server 2.4.37
    apache http server 2.4.39
    apache http server 2.4.41
    apache http server 2.4.43
    apache http server 2.4.46
    apache http server 2.4.48
    ibm rational build forge 8.0
    ibm aspera faspex 4.4.1