Vulnerability Name: | CVE-2021-41524 (CCN-210663) | ||||||||||||
Assigned: | 2021-09-26 | ||||||||||||
Published: | 2021-09-26 | ||||||||||||
Updated: | 2022-10-28 | ||||||||||||
Summary: | While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-476 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-41524 Source: CCN Type: Apache Web site null pointer dereference in h2 fuzzing (CVE-2021-41524) Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20211005 CVE-2021-41524: Apache HTTP Server: null pointer dereference in h2 fuzzing Source: XF Type: UNKNOWN apache-cve202141524-dos(210663) Source: MISC Type: Vendor Advisory https://httpd.apache.org/security/vulnerabilities_24.html Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-5d2d4b6ac5 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-f94985afca Source: GENTOO Type: Third Party Advisory GLSA-202208-20 Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20211029-0009/ Source: CISCO Type: Third Party Advisory 20211007 Apache HTTP Server Vulnerabilties: October 2021 Source: CCN Type: oss-sec Mailing List, Tue, 05 Oct 2021 09:02:50 +0000 CVE-2021-41524: Apache HTTP Server: null pointer dereference in h2 fuzzing Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpujan2022.html | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |