CVE-2021-36160
16.09.2021, 15:15
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).Enginsight
Vendor | Product | Version |
---|---|---|
apache | http_server | 2.4.30 ≤ 𝑥 < 2.4.49 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
netapp | cloud_backup | - |
netapp | clustered_data_ontap | - |
netapp | storagegrid | - |
oracle | communications_cloud_native_core_network_function_cloud_native_environment | 1.10.0 |
oracle | enterprise_manager_base_platform | 13.4.0.0 |
oracle | enterprise_manager_base_platform | 13.5.0.0 |
oracle | http_server | 12.2.1.3.0 |
oracle | http_server | 12.2.1.4.0 |
oracle | instantis_enterprisetrack | 17.1 |
oracle | instantis_enterprisetrack | 17.2 |
oracle | instantis_enterprisetrack | 17.3 |
oracle | peoplesoft_enterprise_peopletools | 8.58 |
oracle | zfs_storage_appliance_kit | 8.8 |
broadcom | brocade_fabric_operating_system_firmware | - |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
apache2 |
| ||||||||||||||
uwsgi |
|

Ubuntu Releases
Common Weakness Enumeration
References