Security News > 2021 > October > Running a recent Apache web server version? You probably need to patch it. Now
The Apache Software Foundation has hurried out a patch to address a pair of HTTP Web Server vulnerabilities, at least one of which is already being actively exploited.
Apache's HTTP Server is widely used, and the vulnerabilities, CVE-2021-41524 and CVE-2021-41773, aren't great.
The former was reported to Apache's security team on 17 September and can be exploited by an external source to DoS a server with a specially crafted request.
It turned up in version 2.4.49, which was released on September 15, and the Apache crew is not aware of any exploit.
Apache said yesterday the flaw was reported to the security team on 29 September and a patch prepared on 1 October.
The flaw crept in during a change made to path normalization in version 2.4.49 of the Apache HTTP Server.
News URL
https://go.theregister.com/feed/www.theregister.com/2021/10/06/apache_web_server_data_patch/
Related news
- Ransomware hits web hosting servers via vulnerable CyberPanel instances (source)
- November 2024 Patch Tuesday forecast: New servers arrive early (source)
- New critical Apache Struts flaw exploited to find vulnerable servers (source)
- Patch Alert: Critical Apache Struts Flaw Found, Exploitation Attempts Detected (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-10-05 | CVE-2021-41773 | Path Traversal vulnerability in multiple products A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. | 7.5 |
2021-10-05 | CVE-2021-41524 | NULL Pointer Dereference vulnerability in multiple products While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. | 7.5 |