[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252588

 
 

909

 
 

196930

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2021-1514 --- httpd24

ID: oval:org.secpod.oval:def:1601455Date: (C)2021-07-26   (M)2024-01-29
Class: PATCHFamily: unix




A flaw was found in Apache httpd. The mod_proxy_wstunnel module tunnels non-upgraded connections. A flaw was found in HTTPd. In some Apache HTTP Server versions, unprivileged local users can stop HTTPd on Windows. The highest threat from this vulnerability is to system availability. A flaw was found In Apache httpd. The mod_proxy has a NULL pointer dereference. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. A flaw was found in Apache httpd. The mod_auth_digest has a single zero byte stack overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. A NULL pointer dereference was found in Apache httpd mod_session. The highest threat from this vulnerability is to system availability. A heap overflow flaw was found In Apache httpd mod_session. The highest threat from this vulnerability is to system availability. A flaw was found in Apache httpd. A possible regression from an earlier security fix broke behavior of MergeSlashes. The highest threat from this vulnerability is to data integrity

Platform:
Amazon Linux AMI
Product:
httpd24
mod24_session
Reference:
ALAS-2021-1514
CVE-2019-17567
CVE-2020-13938
CVE-2020-13950
CVE-2020-35452
CVE-2021-26690
CVE-2021-26691
CVE-2021-30641
CVE    7
CVE-2021-26691
CVE-2021-30641
CVE-2020-13950
CVE-2020-13938
...

© SecPod Technologies