Unrated severityNVD Advisory· Published Mar 26, 2018· Updated Sep 17, 2024
CVE-2018-1302
CVE-2018-1302
Description
When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.
Affected products
8- osv-coords7 versionspkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/apache2&distro=SUSE%20OpenStack%20Cloud%207
< 2.4.23-29.18.2+ 6 more
- (no CPE)range: < 2.4.23-29.18.2
- (no CPE)range: < 2.4.23-29.18.2
- (no CPE)range: < 2.4.23-29.18.2
- (no CPE)range: < 2.4.23-29.18.2
- (no CPE)range: < 2.4.23-29.18.2
- (no CPE)range: < 2.4.23-29.18.2
- (no CPE)range: < 2.4.23-29.18.2
- Apache Software Foundation/Apache HTTP Serverv5Range: 2.4.17 to 2.4.29
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
23- access.redhat.com/errata/RHSA-2019:0366mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2019:0367mitrevendor-advisoryx_refsource_REDHAT
- usn.ubuntu.com/3783-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.openwall.com/lists/oss-security/2018/03/24/5mitremailing-listx_refsource_MLIST
- www.securityfocus.com/bid/103528mitrevdb-entryx_refsource_BID
- www.securitytracker.com/id/1040567mitrevdb-entryx_refsource_SECTRACK
- httpd.apache.org/security/vulnerabilities_24.htmlmitrex_refsource_CONFIRM
- lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3Emitremailing-listx_refsource_MLIST
- security.netapp.com/advisory/ntap-20180601-0004/mitrex_refsource_CONFIRM
- support.hpe.com/hpsc/doc/public/displaymitrex_refsource_CONFIRM
- www.tenable.com/security/tns-2019-09mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.