First published: Mon Mar 26 2018(Updated: )
A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage. Versions Affected: httpd 2.0.1 to 2.4.29 External references: <a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a>
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.30 | 2.4.30 |
Apache HTTP server | <=2.4.29 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Netapp Santricity Cloud Connector | ||
Netapp Storage Automation Store | ||
Netapp Storagegrid | ||
NetApp Clustered Data ONTAP | ||
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =7.4 | |
Redhat Enterprise Linux | =7.5 | |
Redhat Enterprise Linux | =7.6 | |
debian/apache2 | 2.4.62-1~deb11u1 2.4.62-1~deb11u2 2.4.62-1~deb12u2 2.4.62-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-1301.
The severity level of CVE-2018-1301 is medium.
Apache HTTP Server versions prior to 2.4.30 are affected by CVE-2018-1301.
The vulnerability can be exploited by sending a specially crafted request to the Apache HTTP Server, triggering an out of bound access after a size limit is reached by reading the HTTP header.
The remedy for CVE-2018-1301 is to upgrade the Apache HTTP Server to version 2.4.30 or later.