<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2021-26691: Apache httpd: mod_session response handling heap overflow
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Christophe JAILLET <jailletc36 () apache org>
Date: Wed, 09 Jun 2021 23:11:00 +0200
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
CVE-2021-26691: mod_session response handling heap overflow
Severity: low
Vendor: The Apache Software Foundation
Versions Affected:
httpd 2.4.0 to 2.4.46
Description:
Apache HTTP Server 2.4.0 to 2.4.46
A specially crafted SessionHeader sent by an origin server could cause a heap overflow
Mitigation:
None
Credit:
Discovered internally by Christophe Jaillet
References:
https://httpd.apache.org/security/vulnerabilities_24.html
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
CVE-2021-26691: Apache httpd: mod_session response handling heap overflow Christophe JAILLET (Jun 10)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->