mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
118 lines
4.3 KiB
JSON
118 lines
4.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@apache.org",
|
|
"DATE_PUBLIC": "2018-03-23T00:00:00",
|
|
"ID": "CVE-2018-1303",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Apache HTTP Server",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "2.4.5 to 2.4.29"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Apache Software Foundation"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Possible out of bound read in mod_cache_socache"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "USN-3627-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3627-1/"
|
|
},
|
|
{
|
|
"name": "103522",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/103522"
|
|
},
|
|
{
|
|
"name": "DSA-4164",
|
|
"refsource": "DEBIAN",
|
|
"url": "https://www.debian.org/security/2018/dsa-4164"
|
|
},
|
|
{
|
|
"name": "https://security.netapp.com/advisory/ntap-20180601-0004/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://security.netapp.com/advisory/ntap-20180601-0004/"
|
|
},
|
|
{
|
|
"name": "RHSA-2018:3558",
|
|
"refsource": "REDHAT",
|
|
"url": "https://access.redhat.com/errata/RHSA-2018:3558"
|
|
},
|
|
{
|
|
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us"
|
|
},
|
|
{
|
|
"name": "RHSA-2019:0367",
|
|
"refsource": "REDHAT",
|
|
"url": "https://access.redhat.com/errata/RHSA-2019:0367"
|
|
},
|
|
{
|
|
"name": "USN-3627-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3627-2/"
|
|
},
|
|
{
|
|
"name": "1040572",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1040572"
|
|
},
|
|
{
|
|
"name": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
|
|
},
|
|
{
|
|
"name": "[oss-security] 20180323 CVE-2018-1303: Possible out of bound read in mod_cache_socache",
|
|
"refsource": "MLIST",
|
|
"url": "http://www.openwall.com/lists/oss-security/2018/03/24/3"
|
|
},
|
|
{
|
|
"name": "RHSA-2019:0366",
|
|
"refsource": "REDHAT",
|
|
"url": "https://access.redhat.com/errata/RHSA-2019:0366"
|
|
}
|
|
]
|
|
}
|
|
} |