← Volver a CVEs
CVE-2021-26691
CRITICAL9.8
Descripcion
In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado6/10/2021
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
apache:http_serverdebian:debian_linuxfedoraproject:fedoranetapp:cloud_backuporacle:enterprise_manager_ops_centeroracle:instantis_enterprisetrackoracle:secure_backuporacle:zfs_storage_appliance_kit
Debilidades (CWE)
CWE-122CWE-787
Referencias
http://httpd.apache.org/security/vulnerabilities_24.html(security@apache.org)
http://www.openwall.com/lists/oss-security/2021/06/10/7(security@apache.org)
https://lists.apache.org/thread.html/r50cae1b71f1e7421069036b213c26da7d8f47dd59874e3bd956959fe%40%3Cannounce.httpd.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E(security@apache.org)
https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html(security@apache.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/(security@apache.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/(security@apache.org)
https://security.gentoo.org/glsa/202107-38(security@apache.org)
https://security.netapp.com/advisory/ntap-20210702-0001/(security@apache.org)
https://www.debian.org/security/2021/dsa-4937(security@apache.org)
https://www.oracle.com/security-alerts/cpujan2022.html(security@apache.org)
https://www.oracle.com/security-alerts/cpuoct2021.html(security@apache.org)
http://httpd.apache.org/security/vulnerabilities_24.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2021/06/10/7(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r50cae1b71f1e7421069036b213c26da7d8f47dd59874e3bd956959fe%40%3Cannounce.httpd.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202107-38(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20210702-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2021/dsa-4937(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2021.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.