CVE-2024-36387

EUVD-2024-36338
Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.4 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
CISA-ADPADP
5.4 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
Affected Products (NVD)
VendorProductVersion
apachehttp_server
2.4.55 ≤
𝑥
≤ 2.4.59
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
apache2
bookworm
2.4.65-1~deb12u1
fixed
bookworm (security)
2.4.62-1~deb12u2
fixed
bullseye
2.4.62-1~deb11u1
fixed
bullseye (security)
2.4.65-1~deb11u1
fixed
forky
2.4.65-3
fixed
sid
2.4.66-2
fixed
trixie
2.4.65-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apache2
bionic
not-affected
focal
Fixed 2.4.41-4ubuntu3.19
released
jammy
Fixed 2.4.52-1ubuntu4.10
released
mantic
Fixed 2.4.57-2ubuntu2.5
released
noble
Fixed 2.4.58-1ubuntu8.2
released
oracular
Fixed 2.4.62-1ubuntu1
released
trusty
not-affected
xenial
not-affected