ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Nov 2024, 06:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf - Third Party Advisory | |
References | () https://httpd.apache.org/security/vulnerabilities_24.html - Release Notes, Vendor Advisory | |
References | () https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ - | |
References | () https://security.gentoo.org/glsa/202208-20 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20211008-0004/ - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4982 - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory |
07 Nov 2023, 03:37
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-09-16 15:15
Updated : 2024-11-21 06:19
NVD link : CVE-2021-39275
Mitre link : CVE-2021-39275
CVE.ORG link : CVE-2021-39275
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
apache
- http_server
siemens
- sinema_server
- sinec_nms
netapp
- clustered_data_ontap
- storagegrid
- cloud_backup
oracle
- http_server
- instantis_enterprisetrack
- zfs_storage_appliance_kit
CWE
CWE-787
Out-of-bounds Write