Description
A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4164-1 | apache2 security update |
Ubuntu USN |
USN-3627-1 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-3627-2 | Apache HTTP Server vulnerabilities |
References
History
No history.
Subscriptions
Apache
Subscribe
Http Server
Subscribe
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Netapp
Subscribe
Clustered Data Ontap
Subscribe
Santricity Cloud Connector
Subscribe
Storage Automation Store
Subscribe
Storagegrid
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Rhel Software Collections
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-17T02:10:32.813Z
Reserved: 2017-12-07T00:00:00.000Z
Link: CVE-2018-1303
No data.
Status : Modified
Published: 2018-03-26T15:29:00.523
Modified: 2024-11-21T03:59:34.870
Link: CVE-2018-1303
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN