CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
86.4%
A specially crafted request could have crashed the Apache HTTP Server prior
to version 2.4.30, due to an out of bound access after a size limit is
reached by reading the HTTP header. This vulnerability is considered very
hard if not impossible to trigger in non-debug mode (both log and build
level), so it is classified as low risk for common server usage.
www.openwall.com/lists/oss-security/2018/03/24/2
httpd.apache.org/security/vulnerabilities_24.html
launchpad.net/bugs/cve/CVE-2018-1301
nvd.nist.gov/vuln/detail/CVE-2018-1301
security-tracker.debian.org/tracker/CVE-2018-1301
ubuntu.com/security/notices/USN-3627-1
ubuntu.com/security/notices/USN-3627-2
ubuntu.com/security/notices/USN-3937-2
www.cve.org/CVERecord?id=CVE-2018-1301
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
86.4%