A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
07 Nov 2023, 02:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-03-26 15:29
Updated : 2024-02-28 16:25
NVD link : CVE-2018-1301
Mitre link : CVE-2018-1301
CVE.ORG link : CVE-2018-1301
JSON object : View
Products Affected
redhat
- enterprise_linux
canonical
- ubuntu_linux
netapp
- storage_automation_store
- santricity_cloud_connector
- clustered_data_ontap
- storagegrid
apache
- http_server
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer