7.5
CVE-2021-41524
- EPSS 6.77%
- Published 05.10.2021 09:15:07
- Last modified 21.11.2024 06:26:20
- Source security@apache.org
- Teams watchlist Login
- Open Login
While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project.
Data is provided by the National Vulnerability Database (NVD)
Apache ≫ HTTP Server Version2.4.49
Fedoraproject ≫ Fedora Version34
Fedoraproject ≫ Fedora Version35
Oracle ≫ Instantis Enterprisetrack Version17.1
Oracle ≫ Instantis Enterprisetrack Version17.2
Oracle ≫ Instantis Enterprisetrack Version17.3
Netapp ≫ Cloud Backup Version-
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 6.77% | 0.909 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
CWE-476 NULL Pointer Dereference
The product dereferences a pointer that it expects to be valid but is NULL.