WID-SEC-W-2022-0724
Vulnerability from csaf_certbund - Published: 2021-09-16 22:00 - Updated: 2025-01-29 23:00In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im "httpd core", eines Pufferüberlaufs in "ap_escape_quotes" bei böswilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von "mod_proxy". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsmaßnahmen zu umgehen.
In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im "httpd core", eines Pufferüberlaufs in "ap_escape_quotes" bei böswilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von "mod_proxy". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsmaßnahmen zu umgehen.
In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im "httpd core", eines Pufferüberlaufs in "ap_escape_quotes" bei böswilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von "mod_proxy". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsmaßnahmen zu umgehen.
In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im "httpd core", eines Pufferüberlaufs in "ap_escape_quotes" bei böswilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von "mod_proxy". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsmaßnahmen zu umgehen.
Es existiert eine Schwachstelle in Apache HTTP Server. Der Fehler besteht aufgrund eines Out-of-Bound Read in "mod_proxy_uwsgi". Ein entfernter Angreifer kann diese Schwachstelle ausnutzen, um den zugewiesenen Speicher zu lesen und einen Denial-of-Service-Zustand zu verursachen.
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um Sicherheitsvorkehrungen zu umgehen, vertrauliche Informationen offenzulegen und einen Denial of Service Zustand herzustellen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- CISCO Appliance\n- F5 Networks\n- Hardware Appliance\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0724 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0724.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0724 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0724"
},
{
"category": "external",
"summary": "Apache Security Advisory vom 2021-09-16",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5090-1 vom 2021-09-27",
"url": "https://ubuntu.com/security/notices/USN-5090-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5090-2 vom 2021-09-27",
"url": "https://ubuntu.com/security/notices/USN-5090-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:14811-1 vom 2021-09-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009511.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5090-3 vom 2021-09-28",
"url": "https://ubuntu.com/security/notices/USN-5090-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5090-4 vom 2021-09-28",
"url": "https://ubuntu.com/security/notices/USN-5090-4"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2768 vom 2021-09-30",
"url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2776 vom 2021-10-02",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3299-1 vom 2021-10-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3745 vom 2021-10-07",
"url": "https://access.redhat.com/errata/RHSA-2021:3745"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3746 vom 2021-10-07",
"url": "https://access.redhat.com/errata/RHSA-2021:3746"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4982 vom 2021-10-10",
"url": "https://www.debian.org/security/2021/dsa-4982"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3754 vom 2021-10-11",
"url": "https://access.redhat.com/errata/RHSA-2021:3754"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3335-1 vom 2021-10-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K72382141 vom 2021-10-13",
"url": "https://support.f5.com/csp/article/K72382141?utm_source=f5support\u0026utm_medium=RSS"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3816 vom 2021-10-12",
"url": "https://access.redhat.com/errata/RHSA-2021:3816"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3837 vom 2021-10-13",
"url": "https://access.redhat.com/errata/RHSA-2021:3837"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3836 vom 2021-10-13",
"url": "https://access.redhat.com/errata/RHSA-2021:3836"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-3816 vom 2021-10-13",
"url": "http://linux.oracle.com/errata/ELSA-2021-3816.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3856 vom 2021-10-14",
"url": "https://access.redhat.com/errata/RHSA-2021:3856"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-3856 vom 2021-10-15",
"url": "http://linux.oracle.com/errata/ELSA-2021-3856.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2021-119 vom 2021-10-15",
"url": "https://downloads.avaya.com/css/P8/documents/101078189"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2021-1543 vom 2021-10-15",
"url": "https://alas.aws.amazon.com/ALAS-2021-1543.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2021-1716 vom 2021-10-15",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1716.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3522-1 vom 2021-10-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4537 vom 2021-11-10",
"url": "https://access.redhat.com/errata/RHSA-2021:4537"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2021-139 vom 2021-11-12",
"url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2021-139/index.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2021:3856 vom 2021-11-17",
"url": "https://lists.centos.org/pipermail/centos-announce/2021-November/048391.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-4537 vom 2021-11-18",
"url": "https://linux.oracle.com/errata/ELSA-2021-4537.html"
},
{
"category": "external",
"summary": "Cisco Security Advisory CISCO-SA-APACHE-HTTPD-2 vom 2021-11-24",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
},
{
"category": "external",
"summary": "Security Affairs vom 2021-11-29",
"url": "https://securityaffairs.co/wordpress/125107/hacking/cve-2021-40438-apache-http-server-attacks.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9619 vom 2021-12-16",
"url": "http://linux.oracle.com/errata/ELSA-2021-9619.html"
},
{
"category": "external",
"summary": "Cisco Security Advisory CISCO-SA-APACHE-HTTPD-2.4.49-VWL69SWQ vom 2021-12-21",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20211008-0004 vom 2021-12-22",
"url": "https://security.netapp.com/advisory/ntap-20211008-0004/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-9005 vom 2022-01-06",
"url": "https://linux.oracle.com/errata/ELSA-2022-9005.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0143 vom 2022-01-17",
"url": "https://access.redhat.com/errata/RHSA-2022:0143"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-0143 vom 2022-01-19",
"url": "http://linux.oracle.com/errata/ELSA-2022-0143.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-0258 vom 2022-01-26",
"url": "http://linux.oracle.com/errata/ELSA-2022-0258.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2022:0143 vom 2022-01-25",
"url": "https://lists.centos.org/pipermail/centos-announce/2022-January/073551.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2022-003 vom 2027-01-18",
"url": "https://downloads.avaya.com/css/P8/documents/101079910"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0891 vom 2022-03-15",
"url": "https://access.redhat.com/errata/RHSA-2022:0891"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-0891 vom 2022-03-16",
"url": "http://linux.oracle.com/errata/ELSA-2022-0891.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2022-029 vom 2022-03-15",
"url": "https://downloads.avaya.com/css/P8/documents/101080898"
},
{
"category": "external",
"summary": "HCL Article KB0097639 vom 2022-04-23",
"url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0097639"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1915 vom 2022-05-10",
"url": "https://access.redhat.com/errata/RHSA-2022:1915"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-1915 vom 2022-05-17",
"url": "https://linux.oracle.com/errata/ELSA-2022-1915.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2022-053 vom 2022-07-18",
"url": "https://downloads.avaya.com/css/P8/documents/101082704"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202208-20 vom 2022-08-14",
"url": "https://security.gentoo.org/glsa/202208-20"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2022-1599 vom 2022-09-14",
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1599"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2022-1597 vom 2022-09-14",
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1597"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN HPESBST04367 rev.1 vom 2022-09-21",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04367en_us"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:6753 vom 2022-09-29",
"url": "https://access.redhat.com/errata/RHSA-2022:6753"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:7143 vom 2022-10-27",
"url": "https://access.redhat.com/errata/RHSA-2022:7143"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:7144 vom 2022-10-27",
"url": "https://access.redhat.com/errata/RHSA-2022:7144"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us"
},
{
"category": "external",
"summary": "F5 Security Advisory K72382141 vom 2023-08-17",
"url": "https://my.f5.com/manage/s/article/K72382141"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14708-1 vom 2025-01-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5RZA3QZZUTFNFHPJESYW5I7GDZGWBEQF/"
}
],
"source_lang": "en-US",
"title": "Apache HTTP Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-01-29T23:00:00.000+00:00",
"generator": {
"date": "2025-01-30T10:27:35.706+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2022-0724",
"initial_release_date": "2021-09-16T22:00:00.000+00:00",
"revision_history": [
{
"date": "2021-09-16T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-09-20T22:00:00.000+00:00",
"number": "2",
"summary": "Korrektur"
},
{
"date": "2021-09-27T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2021-09-28T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2021-09-29T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2021-10-03T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2021-10-06T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-10-07T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-10-10T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2021-10-12T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE, F5 und Red Hat aufgenommen"
},
{
"date": "2021-10-13T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2021-10-14T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-10-17T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von AVAYA und Amazon aufgenommen"
},
{
"date": "2021-10-26T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-09T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-11-11T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2021-11-17T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2021-11-18T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-11-24T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Cisco aufgenommen"
},
{
"date": "2021-11-29T23:00:00.000+00:00",
"number": "20",
"summary": "Exploit aufgenommen"
},
{
"date": "2021-12-15T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-12-20T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Cisco aufgenommen"
},
{
"date": "2021-12-22T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2022-01-05T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-01-16T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-01-19T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-01-25T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Oracle Linux und CentOS aufgenommen"
},
{
"date": "2022-01-27T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2022-03-15T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-03-16T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Oracle Linux und AVAYA aufgenommen"
},
{
"date": "2022-04-24T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von HCL aufgenommen"
},
{
"date": "2022-05-10T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-05-17T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-07-19T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2022-08-14T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2022-09-13T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2022-09-20T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2022-09-29T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-10-26T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-08-13T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2023-08-17T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2025-01-29T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von openSUSE aufgenommen"
}
],
"status": "final",
"version": "42"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.4.49",
"product": {
"name": "Apache HTTP Server \u003c2.4.49",
"product_id": "67869"
}
},
{
"category": "product_version",
"name": "2.4.49",
"product": {
"name": "Apache HTTP Server 2.4.49",
"product_id": "67869-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:apache:http_server:-"
}
}
}
],
"category": "product_name",
"name": "HTTP Server"
}
],
"category": "vendor",
"name": "Apache"
},
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Application Enablement Services",
"product": {
"name": "Avaya Aura Application Enablement Services",
"product_id": "T015516",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_application_enablement_services:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Communication Manager",
"product": {
"name": "Avaya Aura Communication Manager",
"product_id": "T015126",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:communication_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Experience Portal",
"product": {
"name": "Avaya Aura Experience Portal",
"product_id": "T015519",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_experience_portal:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Session Manager",
"product": {
"name": "Avaya Aura Session Manager",
"product_id": "T015127",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:session_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura System Manager",
"product": {
"name": "Avaya Aura System Manager",
"product_id": "T015518",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_system_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Web License Manager",
"product": {
"name": "Avaya Web License Manager",
"product_id": "T016243",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:web_license_manager:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade Switch",
"product": {
"name": "Broadcom Brocade Switch",
"product_id": "T015844",
"product_identification_helper": {
"cpe": "cpe:/h:brocade:switch:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Cisco Expressway",
"product": {
"name": "Cisco Expressway",
"product_id": "T014329",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:expressway_software:-"
}
}
},
{
"category": "product_name",
"name": "Cisco FXOS",
"product": {
"name": "Cisco FXOS",
"product_id": "660564",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:fxos:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Firepower",
"product": {
"name": "Cisco Firepower",
"product_id": "T011337",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:firepower:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Provisioning",
"product": {
"name": "Cisco Prime Collaboration Provisioning",
"product_id": "T021406",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:prime_collaboration:::provisioning"
}
}
}
],
"category": "product_name",
"name": "Prime Collaboration"
},
{
"category": "product_name",
"name": "Cisco Prime Infrastructure",
"product": {
"name": "Cisco Prime Infrastructure",
"product_id": "T000756",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:prime_infrastructure:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Security Manager (CSM)",
"product": {
"name": "Cisco Security Manager (CSM)",
"product_id": "95918",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:security_manager:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Video Communication Server",
"product": {
"name": "Cisco TelePresence Video Communication Server",
"product_id": "T018121",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:telepresence:video_communication_server"
}
}
}
],
"category": "product_name",
"name": "TelePresence"
},
{
"category": "product_name",
"name": "Cisco Unified Computing System (UCS)",
"product": {
"name": "Cisco Unified Computing System (UCS)",
"product_id": "163824",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:unified_computing_system:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Wide Area Application Services",
"product": {
"name": "Cisco Wide Area Application Services",
"product_id": "2186",
"product_identification_helper": {
"cpe": "cpe:/a:cisco:wide_area_application_services:-"
}
}
}
],
"category": "vendor",
"name": "Cisco"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c17.0.0",
"product": {
"name": "F5 BIG-IP \u003c17.0.0",
"product_id": "T025087"
}
},
{
"category": "product_version",
"name": "17.0.0",
"product": {
"name": "F5 BIG-IP 17.0.0",
"product_id": "T025087-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:17.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c15.1.7",
"product": {
"name": "F5 BIG-IP \u003c15.1.7",
"product_id": "T026110"
}
},
{
"category": "product_version",
"name": "15.1.7",
"product": {
"name": "F5 BIG-IP 15.1.7",
"product_id": "T026110-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:15.1.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c16.1.4",
"product": {
"name": "F5 BIG-IP \u003c16.1.4",
"product_id": "T029403"
}
},
{
"category": "product_version",
"name": "16.1.4",
"product": {
"name": "F5 BIG-IP 16.1.4",
"product_id": "T029403-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:16.1.4"
}
}
}
],
"category": "product_name",
"name": "BIG-IP"
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Fabric OS",
"product": {
"name": "HPE Fabric OS",
"product_id": "T019403",
"product_identification_helper": {
"cpe": "cpe:/o:hpe:fabric_os:-"
}
}
},
{
"category": "product_name",
"name": "HPE Switch",
"product": {
"name": "HPE Switch",
"product_id": "T005119",
"product_identification_helper": {
"cpe": "cpe:/h:hp:switch:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Command Suite",
"product": {
"name": "Hitachi Command Suite",
"product_id": "T010951",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:command_suite:-"
}
}
},
{
"category": "product_name",
"name": "Hitachi Configuration Manager",
"product": {
"name": "Hitachi Configuration Manager",
"product_id": "T020304",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:configuration_manager:-"
}
}
},
{
"category": "product_name",
"name": "Hitachi Ops Center",
"product": {
"name": "Hitachi Ops Center",
"product_id": "T017562",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:ops_center:-"
}
}
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp Data ONTAP",
"product": {
"name": "NetApp Data ONTAP",
"product_id": "7654",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:-"
}
}
},
{
"category": "product_name",
"name": "NetApp StorageGRID",
"product": {
"name": "NetApp StorageGRID",
"product_id": "920206",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:storagegrid:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-20325",
"notes": [
{
"category": "description",
"text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im \"httpd core\", eines Puffer\u00fcberlaufs in \"ap_escape_quotes\" bei b\u00f6swilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von \"mod_proxy\". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"T010951",
"T015844",
"67869",
"T015127",
"T015126",
"T004914",
"T018121",
"T000756",
"T020304",
"T001663",
"398363",
"163824",
"T015519",
"T015518",
"T014329",
"T015516",
"T011337",
"7654",
"T005119",
"2186",
"T012167",
"T016243",
"T017562",
"T019403",
"2951",
"T002207",
"T021406",
"T000126",
"660564",
"95918",
"T027843",
"920206",
"T029403",
"1727",
"T025087",
"T026110"
]
},
"release_date": "2021-09-16T22:00:00.000+00:00",
"title": "CVE-2021-20325"
},
{
"cve": "CVE-2021-34798",
"notes": [
{
"category": "description",
"text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im \"httpd core\", eines Puffer\u00fcberlaufs in \"ap_escape_quotes\" bei b\u00f6swilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von \"mod_proxy\". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"T010951",
"T015844",
"67869",
"T015127",
"T015126",
"T004914",
"T018121",
"T000756",
"T020304",
"T001663",
"398363",
"163824",
"T015519",
"T015518",
"T014329",
"T015516",
"T011337",
"7654",
"T005119",
"2186",
"T012167",
"T016243",
"T017562",
"T019403",
"2951",
"T002207",
"T021406",
"T000126",
"660564",
"95918",
"T027843",
"920206",
"T029403",
"1727",
"T025087",
"T026110"
]
},
"release_date": "2021-09-16T22:00:00.000+00:00",
"title": "CVE-2021-34798"
},
{
"cve": "CVE-2021-39275",
"notes": [
{
"category": "description",
"text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im \"httpd core\", eines Puffer\u00fcberlaufs in \"ap_escape_quotes\" bei b\u00f6swilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von \"mod_proxy\". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"T010951",
"T015844",
"67869",
"T015127",
"T015126",
"T004914",
"T018121",
"T000756",
"T020304",
"T001663",
"398363",
"163824",
"T015519",
"T015518",
"T014329",
"T015516",
"T011337",
"7654",
"T005119",
"2186",
"T012167",
"T016243",
"T017562",
"T019403",
"2951",
"T002207",
"T021406",
"T000126",
"660564",
"95918",
"T027843",
"920206",
"T029403",
"1727",
"T025087",
"T026110"
]
},
"release_date": "2021-09-16T22:00:00.000+00:00",
"title": "CVE-2021-39275"
},
{
"cve": "CVE-2021-40438",
"notes": [
{
"category": "description",
"text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund einer NULL-Zeiger-Dereferenz im \"httpd core\", eines Puffer\u00fcberlaufs in \"ap_escape_quotes\" bei b\u00f6swilliger Eingabe und einer Server Side Request Forgery (SSRF) bei der Verwendung von \"mod_proxy\". Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"T010951",
"T015844",
"67869",
"T015127",
"T015126",
"T004914",
"T018121",
"T000756",
"T020304",
"T001663",
"398363",
"163824",
"T015519",
"T015518",
"T014329",
"T015516",
"T011337",
"7654",
"T005119",
"2186",
"T012167",
"T016243",
"T017562",
"T019403",
"2951",
"T002207",
"T021406",
"T000126",
"660564",
"95918",
"T027843",
"920206",
"T029403",
"1727",
"T025087",
"T026110"
]
},
"release_date": "2021-09-16T22:00:00.000+00:00",
"title": "CVE-2021-40438"
},
{
"cve": "CVE-2021-36160",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Apache HTTP Server. Der Fehler besteht aufgrund eines Out-of-Bound Read in \"mod_proxy_uwsgi\". Ein entfernter Angreifer kann diese Schwachstelle ausnutzen, um den zugewiesenen Speicher zu lesen und einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T010951",
"T015844",
"67869",
"T015127",
"T015126",
"T004914",
"T018121",
"T000756",
"T020304",
"T001663",
"398363",
"163824",
"T015519",
"T015518",
"T014329",
"T015516",
"T011337",
"7654",
"T005119",
"2186",
"T012167",
"T016243",
"T017562",
"T019403",
"2951",
"T002207",
"T021406",
"T000126",
"660564",
"95918",
"T027843",
"920206",
"T029403",
"1727",
"T025087",
"T026110"
]
},
"release_date": "2021-09-16T22:00:00.000+00:00",
"title": "CVE-2021-36160"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.