A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2018-03-26 08:29
Updated : 2021-06-06 04:15
NVD link : CVE-2018-1301
Mitre link : CVE-2018-1301
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
netapp
- santricity_cloud_connector
- clustered_data_ontap
- storagegrid
- storage_automation_store
redhat
- enterprise_linux
apache
- http_server
canonical
- ubuntu_linux
debian
- debian_linux