A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
http://httpd.apache.org/security/vulnerabilities_24.html
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://security.netapp.com/advisory/ntap-20211008-0004/
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://www.debian.org/security/2021/dsa-4982
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html
https://www.oracle.com/security-alerts/cpujan2022.html
Source: MITRE
Published: 2021-09-16
Updated: 2022-10-18
Type: CWE-125
Base Score: 5
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 10
Severity: MEDIUM
Base Score: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Impact Score: 3.6
Exploitability Score: 3.9
Severity: HIGH