Lucene search

K
cvelistApacheCVELIST:CVE-2020-35452
HistoryJun 10, 2021 - 7:10 a.m.

CVE-2020-35452 mod_auth_digest possible stack overflow by one nul byte

2021-06-1007:10:21
apache
www.cve.org

8.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.9%

Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow

CNA Affected

[
  {
    "product": "Apache HTTP Server",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "status": "affected",
        "version": "2.4.46"
      },
      {
        "status": "affected",
        "version": "2.4.43"
      },
      {
        "status": "affected",
        "version": "2.4.41"
      },
      {
        "status": "affected",
        "version": "2.4.39"
      },
      {
        "status": "affected",
        "version": "2.4.38"
      },
      {
        "status": "affected",
        "version": "2.4.37"
      },
      {
        "status": "affected",
        "version": "2.4.35"
      },
      {
        "status": "affected",
        "version": "2.4.34"
      },
      {
        "status": "affected",
        "version": "2.4.33"
      },
      {
        "status": "affected",
        "version": "2.4.29"
      },
      {
        "status": "affected",
        "version": "2.4.28"
      },
      {
        "status": "affected",
        "version": "2.4.27"
      },
      {
        "status": "affected",
        "version": "2.4.26"
      },
      {
        "status": "affected",
        "version": "2.4.25"
      },
      {
        "status": "affected",
        "version": "2.4.23"
      },
      {
        "status": "affected",
        "version": "2.4.20"
      },
      {
        "status": "affected",
        "version": "2.4.18"
      },
      {
        "status": "affected",
        "version": "2.4.17"
      },
      {
        "status": "affected",
        "version": "2.4.16"
      },
      {
        "status": "affected",
        "version": "2.4.12"
      },
      {
        "status": "affected",
        "version": "2.4.10"
      },
      {
        "status": "affected",
        "version": "2.4.9"
      },
      {
        "status": "affected",
        "version": "2.4.7"
      },
      {
        "status": "affected",
        "version": "2.4.6"
      },
      {
        "status": "affected",
        "version": "2.4.4"
      },
      {
        "status": "affected",
        "version": "2.4.3"
      },
      {
        "status": "affected",
        "version": "2.4.2"
      },
      {
        "status": "affected",
        "version": "2.4.1"
      },
      {
        "status": "affected",
        "version": "2.4.0"
      }
    ]
  }
]

References