Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2021-36160

Disclosure Date: September 16, 2021
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
7.5 High
Impact Score:
3.6
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
High

General Information

Vendors

  • apache,
  • broadcom,
  • debian,
  • fedoraproject,
  • netapp,
  • oracle

Products

  • brocade fabric operating system firmware -,
  • cloud backup -,
  • clustered data ontap -,
  • communications cloud native core network function cloud native environment 1.10.0,
  • debian linux 10.0,
  • debian linux 11.0,
  • debian linux 9.0,
  • enterprise manager base platform 13.4.0.0,
  • enterprise manager base platform 13.5.0.0,
  • fedora 34,
  • fedora 35,
  • http server,
  • http server 12.2.1.3.0,
  • http server 12.2.1.4.0,
  • instantis enterprisetrack 17.1,
  • instantis enterprisetrack 17.2,
  • instantis enterprisetrack 17.3,
  • peoplesoft enterprise peopletools 8.58,
  • storagegrid -,
  • zfs storage appliance kit 8.8

References

Advisory

Additional Info

Technical Analysis