Description
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
Published: 2021-09-16
Score: 7.5 High
EPSS: 3.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2768-1 uwsgi security update
Debian DLA Debian DLA DLA-2768-2 uwsgi regression update
Debian DSA Debian DSA DSA-4982-1 apache2 security update
EUVD EUVD EUVD-2021-22784 A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
Ubuntu USN Ubuntu USN USN-5090-1 Apache HTTP Server vulnerabilities
References
Link Providers
http://httpd.apache.org/security/vulnerabilities_24.html cve-icon cve-icon
https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r73260f6ba9fb52e43d860905fc90462ba5a814afda2d011f32bbd41c%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ea0ea39e44acfbb%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r94a61a1517133a19dcf40016e87454ea86e355d06a0cec4c778530f3%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ra1c05a392587bfe34383dffe1213edc425de8d4afc25b7cefab3e781%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ra87a69d0703d09dc52b86e32b08f8d7327af10acdd5f577a4e82596a%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb2341c8786d0f9924f5b666e82d8d170b4804f50a523d750551bef1a%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2021-36160 cve-icon
https://security.gentoo.org/glsa/202208-20 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20211008-0004/ cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-36160 cve-icon
https://www.debian.org/security/2021/dsa-4982 cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
History

No history.

Subscriptions

Apache Http Server
Broadcom Brocade Fabric Operating System Firmware
Debian Debian Linux
Fedoraproject Fedora
Netapp Cloud Backup Clustered Data Ontap Storagegrid
Oracle Communications Cloud Native Core Network Function Cloud Native Environment Enterprise Manager Base Platform Http Server Instantis Enterprisetrack Peoplesoft Enterprise Peopletools Zfs Storage Appliance Kit
Redhat Enterprise Linux Jboss Core Services Rhel Software Collections
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T00:47:43.818Z

Reserved: 2021-07-06T00:00:00.000Z

Link: CVE-2021-36160

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-09-16T15:15:07.330

Modified: 2025-05-01T15:40:05.120

Link: CVE-2021-36160

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-09-16T00:00:00Z

Links: CVE-2021-36160 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses