First published: Mon Mar 26 2018(Updated: )
A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.30 | 2.4.30 |
Apache HTTP server | <=2.4.29 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Netapp Santricity Cloud Connector | ||
Netapp Storage Automation Store | ||
Netapp Storagegrid | ||
NetApp Clustered Data ONTAP | ||
debian/apache2 | 2.4.62-1~deb11u1 2.4.62-1~deb11u2 2.4.62-1~deb12u2 2.4.62-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1303 is a vulnerability in Apache HTTP Server that allows a specially crafted HTTP request header to crash the server due to an out-of-bounds read leading to a denial of service.
CVE-2018-1303 has a severity rating of 7.5 (High).
Apache HTTP Server versions prior to 2.4.30 are affected by CVE-2018-1303.
To fix CVE-2018-1303, you should upgrade Apache HTTP Server to version 2.4.30 or higher.
You can find more information about CVE-2018-1303 at the following references: [1] [2] [3].