Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-20325
HistoryFeb 18, 2022 - 12:00 a.m.

CVE-2021-20325

2022-02-1800:00:00
ubuntu.com
ubuntu.com
29

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

53.1%

Missing fixes for CVE-2021-40438 and CVE-2021-26691 in the versions of
httpd, as shipped in Red Hat Enterprise Linux 8.5.0, causes a security
regression compared to the versions shipped in Red Hat Enterprise Linux
8.4. A user who installs or updates to Red Hat Enterprise Linux 8.5.0 would
be vulnerable to the mentioned CVEs, even if they were properly fixed in
Red Hat Enterprise Linux 8.4. CVE-2021-20325 was assigned to that Red Hat
specific security regression and it does not affect the upstream versions
of httpd.

Notes

Author Note
alexmurray This vulnerability is specific to RHEL only and does not affect apache2 as packaged in Ubuntu.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

53.1%