7.5
CVE-2016-2161
- EPSS 39.61%
- Published 27.07.2017 21:29:00
- Last modified 20.04.2025 01:37:25
- Source security@apache.org
- Teams watchlist Login
- Open Login
In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
Data is provided by the National Vulnerability Database (NVD)
Apache ≫ HTTP Server Version2.4.0
Apache ≫ HTTP Server Version2.4.1
Apache ≫ HTTP Server Version2.4.2
Apache ≫ HTTP Server Version2.4.3
Apache ≫ HTTP Server Version2.4.6
Apache ≫ HTTP Server Version2.4.7
Apache ≫ HTTP Server Version2.4.8
Apache ≫ HTTP Server Version2.4.9
Apache ≫ HTTP Server Version2.4.10
Apache ≫ HTTP Server Version2.4.12
Apache ≫ HTTP Server Version2.4.14
Apache ≫ HTTP Server Version2.4.16
Apache ≫ HTTP Server Version2.4.19
Apache ≫ HTTP Server Version2.4.20
Apache ≫ HTTP Server Version2.4.21
Apache ≫ HTTP Server Version2.4.22
Apache ≫ HTTP Server Version2.4.23
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 39.61% | 0.972 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-823 Use of Out-of-range Pointer Offset
The product performs pointer arithmetic on a valid pointer, but it uses an offset that can point outside of the intended range of valid memory locations for the resulting pointer.