Vulnerability Description
Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Http Server | <= 2.4.48 |
| Fedoraproject | Fedora | 34 |
| Debian | Debian Linux | 9.0 |
| Netapp | Cloud Backup | - |
| Netapp | Clustered Data Ontap | - |
| Netapp | Storagegrid | - |
| Tenable | Tenable.Sc | <= 5.19.1 |
| Oracle | Communications Cloud Native Core Network Function Cloud Native Environment | 1.10.0 |
| Oracle | Enterprise Manager Base Platform | 13.4.0.0 |
| Oracle | Http Server | 12.2.1.3.0 |
| Oracle | Instantis Enterprisetrack | 17.1 |
| Oracle | Peoplesoft Enterprise Peopletools | 8.58 |
| Oracle | Zfs Storage Appliance Kit | 8.8 |
| Broadcom | Brocade Fabric Operating System Firmware | - |
| Siemens | Ruggedcom Nms | All versions |
| Siemens | Sinec Nms | All versions |
| Siemens | Sinema Remote Connect Server | < 3.1 |
| Siemens | Sinema Server | 14.0 |
Related Weaknesses (CWE)
References
- http://httpd.apache.org/security/vulnerabilities_24.htmlRelease NotesVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdfPatchThird Party Advisory
- https://kc.mcafee.com/corporate/index?page=content&id=SB10379Third Party Advisory
- https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a14
- https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156
- https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b318
- https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c
- https://lists.debian.org/debian-lts-announce/2021/10/msg00001.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.gentoo.org/glsa/202208-20Third Party Advisory
- https://security.netapp.com/advisory/ntap-20211008-0004/Third Party Advisory
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aThird Party Advisory
- https://www.debian.org/security/2021/dsa-4982Third Party Advisory
- https://www.oracle.com/security-alerts/cpuapr2022.htmlPatchThird Party Advisory
FAQ
What is CVE-2021-34798?
CVE-2021-34798 is a vulnerability with a CVSS score of 7.5 (HIGH). Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
How severe is CVE-2021-34798?
CVE-2021-34798 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-34798?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Fedoraproject Fedora, Debian Debian Linux, Netapp Cloud Backup, Netapp Clustered Data Ontap.