HIGH · 7.5

CVE-2021-36160

A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).

Vulnerability Description

A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
ApacheHttp Server>= 2.4.30, < 2.4.49
FedoraprojectFedora34
DebianDebian Linux9.0
NetappCloud Backup-
NetappClustered Data Ontap-
NetappStoragegrid-
OracleCommunications Cloud Native Core Network Function Cloud Native Environment1.10.0
OracleEnterprise Manager Base Platform13.4.0.0
OracleHttp Server12.2.1.3.0
OracleInstantis Enterprisetrack17.1
OraclePeoplesoft Enterprise Peopletools8.58
OracleZfs Storage Appliance Kit8.8
BroadcomBrocade Fabric Operating System Firmware-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2021-36160?

CVE-2021-36160 is a vulnerability with a CVSS score of 7.5 (HIGH). A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).

How severe is CVE-2021-36160?

CVE-2021-36160 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2021-36160?

Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Fedoraproject Fedora, Debian Debian Linux, Netapp Cloud Backup, Netapp Clustered Data Ontap.