Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
21 Nov 2024, 06:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://httpd.apache.org/security/vulnerabilities_24.html - Release Notes, Vendor Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf - Patch, Third Party Advisory | |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10379 - Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ - | |
References | () https://security.gentoo.org/glsa/202208-20 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20211008-0004/ - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4982 - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
References | () https://www.tenable.com/security/tns-2021-17 - Third Party Advisory |
07 Nov 2023, 03:36
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-09-16 15:15
Updated : 2024-11-21 06:11
NVD link : CVE-2021-34798
Mitre link : CVE-2021-34798
CVE.ORG link : CVE-2021-34798
JSON object : View
Products Affected
debian
- debian_linux
oracle
- peoplesoft_enterprise_peopletools
- zfs_storage_appliance_kit
- communications_cloud_native_core_network_function_cloud_native_environment
- http_server
- instantis_enterprisetrack
- enterprise_manager_base_platform
fedoraproject
- fedora
apache
- http_server
siemens
- sinema_remote_connect_server
- sinema_server
- sinec_nms
- ruggedcom_nms
netapp
- clustered_data_ontap
- storagegrid
- cloud_backup
tenable
- tenable.sc
broadcom
- brocade_fabric_operating_system_firmware
CWE
CWE-476
NULL Pointer Dereference