CVE-2021-31618

Severity
7.5HIGH
EPSS
11.0%
top 6.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 15
Latest updateMay 24

Description

Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages6 packages

NVDapache/http_server1.15.17, 2.4.47+1
Debianapache2< 2.4.46-5+3
NVDoracle/instantis_enterprisetrack17.1, 17.2, 17.3+2

Also affects: Debian Linux 10.0, 9.0, Fedora 33, 34

Patches

🔴Vulnerability Details

3
GHSA
GHSA-4jq3-qrx6-87cc: Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server2022-05-24
CVEList
NULL pointer dereference on specially crafted HTTP/2 request2021-06-15
OSV
CVE-2021-31618: Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server2021-06-15

📋Vendor Advisories

4
Microsoft
NULL pointer dereference on specially crafted HTTP/2 request2021-06-08
Red Hat
httpd: NULL pointer dereference on specially crafted HTTP/2 request2021-06-04
Debian
CVE-2021-31618: apache2 - Apache HTTP Server protocol handler for the HTTP/2 protocol checks received requ...2021
Apache
Apache httpd: CVE-2021-31618
CVE-2021-31618 (HIGH CVSS 7.5) | Apache HTTP Server protocol handler | cvebase.io