7.5
CVSSv3

CVE-2021-31618

Published: 15/06/2021 Updated: 01/05/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 1.15.17

apache http server 2.4.47

fedoraproject fedora 33

fedoraproject fedora 34

debian debian linux 9.0

debian debian linux 10.0

oracle instantis enterprisetrack 17.1

oracle instantis enterprisetrack 17.2

oracle instantis enterprisetrack 17.3

oracle enterprise manager ops center 12.4.0.0

oracle zfs storage appliance kit 8.8

Vendor Advisories

Debian Bug report logs - #989562 apache2: CVE-2021-31618: NULL pointer dereference on specially crafted HTTP/2 request Package: src:apache2; Maintainer for src:apache2 is Debian Apache Maintainers <debian-apache@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 7 Jun 2021 15:39:02 UT ...
Several vulnerabilities have been found in the Apache HTTP server, which could result in denial of service In addition the implementation of the MergeSlashes option could result in unexpected behaviour For the stable distribution (buster), these problems have been fixed in version 2438-3+deb10u5 We recommend that you upgrade your apache2 packa ...
A null pointer de-reference was found in the way httpd handled specially crafted HTTP/2 request A remote attacker could use this flaw to crash the httpd child process, causing temporary denial of service (CVE-2021-31618) ...
A null pointer de-reference was found in the way httpd handled specially crafted HTTP/2 request A remote attacker could use this flaw to crash the httpd child process, causing temporary denial of service (CVE-2021-31618) ...
No description is available for this CVE ...
A security issue has been found in the Apache HTTP Server (httpd) before version 2448 The Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well On violation of these restrictions, an HTTP response is sent to t ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: CVE-2021-31618: Apache httpd: NULL pointer dereference on specially crafted HTTP/2 request <!--X-Subject-Header-End--> <!- ...