7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.006 Low
EPSS
Percentile
77.9%
While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected
during HTTP/2 request processing, allowing an external source to DoS the
server. This requires a specially crafted request. The vulnerability was
recently introduced in version 2.4.49. No exploit is known to the project.
www.openwall.com/lists/oss-security/2021/10/05/1
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41524
httpd.apache.org/security/vulnerabilities_24.html
httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-41524
launchpad.net/bugs/cve/CVE-2021-41524
nvd.nist.gov/vuln/detail/CVE-2021-41524
security-tracker.debian.org/tracker/CVE-2021-41524
www.openwall.com/lists/oss-security/2021/10/05/1
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.006 Low
EPSS
Percentile
77.9%