Kaspersky ID:
KLA12369
Дата обнаружения:
01/06/2021
Обновлено:
02/11/2024

Описание

Multiple vulnerabilities were found in Apache HTTP Server. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Heap overflow vulnerability in mod_session can be exploited via special crafted SessionHandler to cause denial of service.
  2. NULL pointer dereference vulnerability in mod_session can be exploited via special crafted coockie header to cause denial of service.
  3. Security bypass vulnerability vulnerability in httpd can be exploited to bypass security restrictions.
  4. NULL pointer dereference vulnerability in mod_http2 can be exploited via special crafted HTTP/2 request to cause denial of service.
  5. Security bypass vulnerability in mod_proxy_wstunnel can be exploited to bypass security restrictions.
  6. Stack overflow vulnerability in mod_auth_digest can be exploited bia specia crafted digest to cause denial of service.
  7. Security bypass vulnerability in «MergeSlashes OFF» can be exploited via special crafted URL to bypass security restrictions.
  8. NULL pointer dereference vulnerability in mod_proxy_http can be exploited via special crafted requests to cause denial of service.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Связанные продукты

Список CVE

  • CVE-2021-26691
    critical
  • CVE-2021-26690
    critical
  • CVE-2020-13938
    high
  • CVE-2021-31618
    critical
  • CVE-2019-17567
    high
  • CVE-2020-35452
    high
  • CVE-2021-30641
    high
  • CVE-2020-13950
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.