CVE-2018-1301
26.03.2018, 15:29
A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.Enginsight
Vendor | Product | Version |
---|---|---|
apache | http_server | 𝑥 ≤ 2.4.29 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 17.10 |
canonical | ubuntu_linux | 18.04 |
netapp | santricity_cloud_connector | - |
netapp | storage_automation_store | - |
netapp | storagegrid | - |
netapp | clustered_data_ontap | - |
redhat | enterprise_linux | 6.0 |
redhat | enterprise_linux | 7.0 |
redhat | enterprise_linux | 7.4 |
redhat | enterprise_linux | 7.5 |
redhat | enterprise_linux | 7.6 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References