{"id":"CVE-2020-13950","details":"Apache HTTP Server versions 2.4.41 to 2.4.46 mod_proxy_http can be made to crash (NULL pointer dereference) with specially crafted requests using both Content-Length and Transfer-Encoding headers, leading to a Denial of Service","aliases":["BIT-apache-2020-13950"],"modified":"2026-04-10T04:22:28.204669Z","published":"2021-06-10T07:15:07.440Z","related":["MGASA-2021-0265","SUSE-SU-2021:2127-1","openSUSE-SU-2021:0908-1","openSUSE-SU-2021:2127-1"],"references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/rbe197409ae4a58b629fb792d1aed541ccbbf865121a80e1c5938d223%40%3Cannounce.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/06/10/4"},{"type":"ADVISORY","url":"https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202107-38"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210702-0001/"},{"type":"ADVISORY","url":"http://httpd.apache.org/security/vulnerabilities_24.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/httpd","events":[{"introduced":"9ad3086dd4c6a4dee343651eadf98a1ff22afe4c"},{"last_affected":"8064ccc50bffe86ad464246b9bfac7d78d7dbc1f"}],"database_specific":{"versions":[{"introduced":"2.4.41"},{"last_affected":"2.4.46"}]}}],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"12.4.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"17.1"}]},{"events":[{"introduced":"0"},{"last_affected":"17.2"}]},{"events":[{"introduced":"0"},{"last_affected":"17.3"}]},{"events":[{"introduced":"0"},{"last_affected":"8.8"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-13950.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}