Lucene search

K
redosRedosROS-20211223-04
HistoryDec 23, 2021 - 12:00 a.m.

ROS-20211223-04

2021-12-2300:00:00
redos.red-soft.ru
53
apache
http
server
vulnerability
buffer overflow
ssrf
remote
exploitation
code execution
null pointer
crash
unix

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.312

Percentile

97.1%

Apache HTTP server vulnerability is related to buffer overflow. Exploitation of the vulnerability could allow
an attacker acting remotely to send a special HTTP request to a vulnerable web server, cause a buffer overflow, and execute arbitrary code on the target system.
buffer overflow and execute arbitrary code on the target system.

The Apache HTTP server vulnerability involves server-side request forgery (SSRF). Exploitation
The vulnerability could allow an attacker acting remotely to send a special HTTP request and
trick the web server into initiating requests to arbitrary systems or cause a NULL pointer dereferencing error and lead to NULL pointer failure.
NULL pointer dereferencing error and cause the web server to crash.

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64httpd< 2.4.52-1UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.312

Percentile

97.1%