CVE-2021-36160 - Out-of-bounds Read

Severity

75%

Complexity

39%

Confidentiality

60%

A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).

CVSS 3.1 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).

Demo Examples

Out-of-bounds Read

CWE-125

In the following code, the method retrieves a value from an array at a specific array index location that is given as an input parameter to the method


               
}
return value;// check that the array index is less than the maximum// length of the array
value = array[index];// get the value at the specified index of the array
// if array index is invalid then output error message// and return value indicating error
value = -1;

However, this method only verifies that the given array index is less than the maximum length of the array but does not check for the minimum value (CWE-839). This will allow a negative value to be accepted as the input array index, which will result in a out of bounds read (CWE-125) and may allow access to sensitive memory. The input array index should be checked to verify that is within the maximum and minimum range required for the array (CWE-129). In this example the if statement should be modified to include a minimum range check, as shown below.


               
...// check that the array index is within the correct// range of values for the array

Overview

First reported 3 years ago

2021-09-16 15:15:00

Last updated 3 years ago

2021-11-29 17:19:00

Affected Software

Apache Software Foundation Apache HTTP Server

Debian Linux 9.0

9.0

References

http://httpd.apache.org/security/vulnerabilities_24.html

[httpd-cvs] 20210916 [httpd-site] branch main updated: Add descriptions for CVE-2021-33193 CVE-2021-36160

[httpd-cvs] 20210916 [httpd-site] branch main updated: Revert "Add descriptions for CVE-2021-33193 CVE-2021-36160"

FEDORA-2021-dce7e7738e

[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info

[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info

[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info

[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info

FEDORA-2021-e3f6dd670d

http://httpd.apache.org/security/vulnerabilities_24.html

Release Notes, Vendor Advisory

[httpd-cvs] 20210916 [httpd-site] branch main updated: Add descriptions for CVE-2021-33193 CVE-2021-36160

Mailing List, Vendor Advisory

[httpd-cvs] 20210916 [httpd-site] branch main updated: Revert "Add descriptions for CVE-2021-33193 CVE-2021-36160"

Mailing List, Vendor Advisory

FEDORA-2021-dce7e7738e

Mailing List, Third Party Advisory

[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info

Mailing List, Vendor Advisory

[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info

Mailing List, Vendor Advisory

[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info

Mailing List, Vendor Advisory

[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info

Mailing List, Vendor Advisory

FEDORA-2021-e3f6dd670d

Mailing List, Third Party Advisory

[debian-lts-announce] 20210929 [SECURITY] [DLA 2768-1] uwsgi security update

[httpd-bugs] 20211005 [Bug 65616] New: CVE-2021-36160 regression

[httpd-bugs] 20211005 [Bug 65616] CVE-2021-36160 regression

[httpd-bugs] 20211006 [Bug 65616] CVE-2021-36160 regression

[debian-lts-announce] 20210929 [SECURITY] [DLA 2768-1] uwsgi security update

Mailing List, Third Party Advisory

[httpd-bugs] 20211005 [Bug 65616] New: CVE-2021-36160 regression

Mailing List, Vendor Advisory

[httpd-bugs] 20211005 [Bug 65616] CVE-2021-36160 regression

Mailing List, Vendor Advisory

[httpd-bugs] 20211006 [Bug 65616] CVE-2021-36160 regression

Mailing List, Vendor Advisory

https://security.netapp.com/advisory/ntap-20211008-0004/

[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression

[httpd-bugs] 20211009 [Bug 65616] CVE-2021-36160 regression

DSA-4982

[httpd-bugs] 20211011 [Bug 65616] CVE-2021-36160 regression

[httpd-bugs] 20211012 [Bug 65616] CVE-2021-36160 regression

[debian-lts-announce] 20211020 [SECURITY] [DLA 2768-2] uwsgi regression update

20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021

https://security.netapp.com/advisory/ntap-20211008-0004/

Third Party Advisory

[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression

Mailing List, Vendor Advisory

[httpd-bugs] 20211009 [Bug 65616] CVE-2021-36160 regression

Mailing List, Vendor Advisory

DSA-4982

Third Party Advisory

[httpd-bugs] 20211011 [Bug 65616] CVE-2021-36160 regression

Mailing List, Vendor Advisory

[httpd-bugs] 20211012 [Bug 65616] CVE-2021-36160 regression

Mailing List, Vendor Advisory

[debian-lts-announce] 20211020 [SECURITY] [DLA 2768-2] uwsgi regression update

Mailing List, Third Party Advisory

20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021

Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.