First published: Tue Nov 02 2021(Updated: )
Akka HTTP 10.1.x before 10.1.15 and 10.2.x before 10.2.7 can encounter stack exhaustion while parsing HTTP headers, which allows a remote attacker to conduct a Denial of Service attack by sending a User-Agent header with deeply nested comments.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Akka Http Server | >=10.1.0<10.1.15 | |
Akka Http Server | >=10.2.0<10.2.7 | |
>=10.1.0<10.1.15 | ||
>=10.2.0<10.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42697 is a vulnerability in Akka HTTP versions 10.1.x before 10.1.15 and 10.2.x before 10.2.7 that can lead to stack exhaustion while parsing HTTP headers, allowing a remote attacker to conduct a Denial of Service (DoS) attack.
CVE-2021-42697 has a severity rating of 7.5 (high).
CVE-2021-42697 affects Akka HTTP versions 10.1.x before 10.1.15 and 10.2.x before 10.2.7.
A remote attacker can exploit CVE-2021-42697 by sending a User-Agent header with deeply nested comments.
Yes, the fix for CVE-2021-42697 is to upgrade Akka HTTP to version 10.1.15 or 10.2.7 depending on the installed version.