A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).

Project Subscriptions

Vendors Products
Http Server Subscribe
Broadcom Subscribe
Brocade Fabric Operating System Firmware Subscribe
Debian Linux Subscribe
Fedoraproject Subscribe
Cloud Backup Subscribe
Clustered Data Ontap Subscribe
Storagegrid Subscribe
Communications Cloud Native Core Network Function Cloud Native Environment Subscribe
Enterprise Manager Base Platform Subscribe
Http Server Subscribe
Instantis Enterprisetrack Subscribe
Peoplesoft Enterprise Peopletools Subscribe
Zfs Storage Appliance Kit Subscribe
Enterprise Linux Subscribe
Jboss Core Services Subscribe
Rhel Software Collections Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2768-1 uwsgi security update
Debian DLA Debian DLA DLA-2768-2 uwsgi regression update
Debian DSA Debian DSA DSA-4982-1 apache2 security update
EUVD EUVD EUVD-2021-22784 A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
Ubuntu USN Ubuntu USN USN-5090-1 Apache HTTP Server vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://httpd.apache.org/security/vulnerabilities_24.html cve-icon cve-icon
https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r73260f6ba9fb52e43d860905fc90462ba5a814afda2d011f32bbd41c%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r7f2746e916ed370239bc1a1025e5ebbf345f79df9ea0ea39e44acfbb%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r94a61a1517133a19dcf40016e87454ea86e355d06a0cec4c778530f3%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ra1c05a392587bfe34383dffe1213edc425de8d4afc25b7cefab3e781%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ra87a69d0703d09dc52b86e32b08f8d7327af10acdd5f577a4e82596a%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb2341c8786d0f9924f5b666e82d8d170b4804f50a523d750551bef1a%40%3Cbugs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2021-36160 cve-icon
https://security.gentoo.org/glsa/202208-20 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20211008-0004/ cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-36160 cve-icon
https://www.debian.org/security/2021/dsa-4982 cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T00:47:43.818Z

Reserved: 2021-07-06T00:00:00

Link: CVE-2021-36160

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-09-16T15:15:07.330

Modified: 2025-05-01T15:40:05.120

Link: CVE-2021-36160

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-09-16T00:00:00Z

Links: CVE-2021-36160 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses