Vulnerability Description
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Http Server | >= 2.4.30, < 2.4.49 |
| Fedoraproject | Fedora | 34 |
| Debian | Debian Linux | 9.0 |
| Netapp | Cloud Backup | - |
| Netapp | Clustered Data Ontap | - |
| Netapp | Storagegrid | - |
| Oracle | Communications Cloud Native Core Network Function Cloud Native Environment | 1.10.0 |
| Oracle | Enterprise Manager Base Platform | 13.4.0.0 |
| Oracle | Http Server | 12.2.1.3.0 |
| Oracle | Instantis Enterprisetrack | 17.1 |
| Oracle | Peoplesoft Enterprise Peopletools | 8.58 |
| Oracle | Zfs Storage Appliance Kit | 8.8 |
| Broadcom | Brocade Fabric Operating System Firmware | - |
Related Weaknesses (CWE)
References
- http://httpd.apache.org/security/vulnerabilities_24.htmlRelease NotesVendor Advisory
- https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d1104379Patch
- https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a14Patch
- https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156Patch
- https://lists.apache.org/thread.html/r73260f6ba9fb52e43d860905fc90462ba5a814afdaPatch
- https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ePatch
- https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b318Patch
- https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33cPatch
- https://lists.apache.org/thread.html/r94a61a1517133a19dcf40016e87454ea86e355d06aPatch
- https://lists.apache.org/thread.html/ra1c05a392587bfe34383dffe1213edc425de8d4afcPatch
- https://lists.apache.org/thread.html/ra87a69d0703d09dc52b86e32b08f8d7327af10acddPatch
- https://lists.apache.org/thread.html/rb2341c8786d0f9924f5b666e82d8d170b4804f50a5Patch
- https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaPatch
- https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2Patch
- https://lists.debian.org/debian-lts-announce/2021/09/msg00016.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2021-36160?
CVE-2021-36160 is a vulnerability with a CVSS score of 7.5 (HIGH). A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
How severe is CVE-2021-36160?
CVE-2021-36160 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-36160?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Fedoraproject Fedora, Debian Debian Linux, Netapp Cloud Backup, Netapp Clustered Data Ontap.