First published: Fri Jun 04 2021(Updated: )
A null pointer de-reference was found in the way httpd handled specially crafted HTTP/2 request. A remote attacker could use this flaw to crash the httpd child process, causing temporary denial of service.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/http | <2.4.48 | 2.4.48 |
Apache Http Server | =1.15.17 | |
Apache Http Server | =2.4.47 | |
Fedora | =33 | |
Fedora | =34 | |
Debian | =9.0 | |
Debian | =10.0 | |
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
oracle instantis enterprisetrack | =17.1 | |
oracle instantis enterprisetrack | =17.2 | |
oracle instantis enterprisetrack | =17.3 | |
Oracle Sun ZFS Storage Appliance Kit | =8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31618 is a null pointer de-reference vulnerability found in the Apache HTTP Server protocol handler for the HTTP/2 protocol.
The severity of CVE-2021-31618 is high, with a CVSS severity score of 7.5.
The Apache HTTP Server versions 2.4.47 and 2.4.48, as well as some specific versions of Fedora, Debian, Oracle Enterprise Manager Ops Center, Oracle Instantis Enterprisetrack, and Oracle ZFS Storage Appliance Kit are affected.
CVE-2021-31618 allows an attacker to exploit a null pointer de-reference vulnerability, potentially causing a denial-of-service condition by crashing the server process.
To mitigate CVE-2021-31618, it is recommended to upgrade to Apache HTTP Server version 2.4.49 or apply the necessary patches provided by the distribution vendor.