CVE-2021-36160
high-risk
Published 2021-09-16
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
Do I need to act?
~
3.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
References (48)
Release Notes
http://httpd.apache.org/security/vulnerabilities_24.html
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro...
Third Party Advisory
https://security.gentoo.org/glsa/202208-20
Third Party Advisory
https://security.netapp.com/advisory/ntap-20211008-0004/
and 28 more references
53
/ 100
high-risk
Severity
26/34 · High
Exploitability
7/34 · Low
Exposure
20/34 · Moderate