CVE-2018-1301

Impact:
Low
Public Date:
2018-03-21
CWE:
CWE-125
Bugzilla:
1560643: CVE-2018-1301 httpd: Out of bounds access after failure in reading the HTTP request

The MITRE CVE dictionary describes this issue as:

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

Find out more about CVE-2018-1301 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 3.7
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat Software Collections for Red Hat Enterprise Linux 6 (httpd24-httpd) RHSA-2018:3558 2018-11-13
Red Hat Software Collections for Red Hat Enterprise Linux 7 (httpd24-httpd) RHSA-2018:3558 2018-11-13

Affected Packages State

Platform Package State
Red Hat Mobile Application Platform On-Premise 4 rhmap-httpd-docker Will not fix
Red Hat JBoss Web Server 3 httpd Not affected
Red Hat JBoss EWS 2 httpd Will not fix
Red Hat JBoss Core Services 1 httpd Affected
Red Hat Enterprise Linux 7 httpd Affected
Red Hat Enterprise Linux 6 httpd Affected
Red Hat Enterprise Linux 5 httpd Will not fix

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.