Description
A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1389-1 | apache2 security update |
Debian DSA |
DSA-4164-1 | apache2 security update |
EUVD |
EUVD-2018-11909 | A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage. |
Ubuntu USN |
USN-3627-1 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-3627-2 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-3937-2 | Apache vulnerabilities |
References
History
No history.
Subscriptions
Apache
Subscribe
Http Server
Subscribe
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Netapp
Subscribe
Clustered Data Ontap
Subscribe
Santricity Cloud Connector
Subscribe
Storage Automation Store
Subscribe
Storagegrid
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Rhel Software Collections
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T17:22:56.161Z
Reserved: 2017-12-07T00:00:00.000Z
Link: CVE-2018-1301
No data.
Status : Modified
Published: 2018-03-26T15:29:00.430
Modified: 2024-11-21T03:59:34.537
Link: CVE-2018-1301
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN