| { |
| "CVE_data_meta": { |
| "ASSIGNER": "security@apache.org", |
| "ID": "CVE-2021-36160", |
| "STATE": "READY", |
| "TITLE": "mod_proxy_uwsgi out of bound read" |
| }, |
| "affects": { |
| "vendor": { |
| "vendor_data": [ |
| { |
| "product": { |
| "product_data": [ |
| { |
| "product_name": "Apache HTTP Server", |
| "version": { |
| "version_data": [ |
| { |
| "version_affected": "<=", |
| "version_name": "Apache HTTP Server 2.4", |
| "version_value": "2.4.48" |
| }, |
| { |
| "version_affected": "!<", |
| "version_name": "Apache HTTP Server 2.4", |
| "version_value": "2.4.30" |
| } |
| ] |
| } |
| } |
| ] |
| }, |
| "vendor_name": "Apache Software Foundation" |
| } |
| ] |
| } |
| }, |
| "credit": [ |
| { |
| "lang": "eng", |
| "value": "LI ZHI XIN from NSFocus Security Team" |
| } |
| ], |
| "data_format": "MITRE", |
| "data_type": "CVE", |
| "data_version": "4.0", |
| "description": { |
| "description_data": [ |
| { |
| "lang": "eng", |
| "value": "A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS).\n\nThis issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive)." |
| } |
| ] |
| }, |
| "generator": { |
| "engine": "Vulnogram 0.0.9" |
| }, |
| "impact": [ |
| { |
| "other": "moderate" |
| } |
| ], |
| "problemtype": { |
| "problemtype_data": [ |
| { |
| "description": [ |
| { |
| "lang": "eng", |
| "value": "CWE-125 out of bound read" |
| } |
| ] |
| } |
| ] |
| }, |
| "references": { |
| "reference_data": [ |
| { |
| "refsource": "CONFIRM" |
| } |
| ] |
| }, |
| "source": { |
| "discovery": "UNKNOWN" |
| }, |
| "timeline": [ |
| { |
| "lang": "eng", |
| "time": "2021-04-26", |
| "value": "reported" |
| }, |
| { |
| "lang": "eng", |
| "time": "2021-09-16", |
| "value": "2.4.49 release" |
| } |
| ] |
| } |