5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.009 Low
EPSS
Percentile
82.5%
A specially crafted request could have crashed the Apache HTTP Server prior
to version 2.4.30, due to an out of bound access after a size limit is
reached by reading the HTTP header. This vulnerability is considered very
hard if not impossible to trigger in non-debug mode (both log and build
level), so it is classified as low risk for common server usage.
www.openwall.com/lists/oss-security/2018/03/24/2
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
httpd.apache.org/security/vulnerabilities_24.html
launchpad.net/bugs/cve/CVE-2018-1301
nvd.nist.gov/vuln/detail/CVE-2018-1301
security-tracker.debian.org/tracker/CVE-2018-1301
ubuntu.com/security/notices/USN-3627-1
ubuntu.com/security/notices/USN-3627-2
ubuntu.com/security/notices/USN-3937-2
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.009 Low
EPSS
Percentile
82.5%