A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.
This issue affects Apache HTTP Server 2.4.54 and earlier.
References
Link | Resource |
---|---|
https://httpd.apache.org/security/vulnerabilities_24.html | Release Notes Vendor Advisory |
https://security.gentoo.org/glsa/202309-01 | |
https://httpd.apache.org/security/vulnerabilities_24.html | Release Notes Vendor Advisory |
https://security.gentoo.org/glsa/202309-01 | |
https://security.netapp.com/advisory/ntap-20230316-0005/ |
Configurations
History
13 Feb 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. |
Information
Published : 2023-01-17 20:15
Updated : 2025-02-13 17:15
NVD link : CVE-2006-20001
Mitre link : CVE-2006-20001
CVE.ORG link : CVE-2006-20001
JSON object : View
Products Affected
apache
- http_server
CWE
CWE-787
Out-of-bounds Write