{"id":"CVE-2020-35452","details":"Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow","aliases":["BIT-apache-2020-35452"],"modified":"2026-04-16T04:40:09.972399350Z","published":"2021-06-10T07:15:07.493Z","related":["ALSA-2022:1915","SUSE-SU-2021:14749-1","SUSE-SU-2021:2004-1","SUSE-SU-2021:2006-1","SUSE-SU-2021:2127-1","openSUSE-SU-2021:0908-1","openSUSE-SU-2021:2127-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rccb1b8225583a48c6360edc7a93cc97ae8b0215791e455dc607e7602%40%3Cannounce.httpd.apache.org%3E"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202107-38"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210702-0001/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4937"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"type":"ADVISORY","url":"http://httpd.apache.org/security/vulnerabilities_24.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/06/10/5"},{"type":"ADVISORY","url":"https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/httpd","events":[{"introduced":"da5873e80d6eee7a0838793bf68f1d0254745fbb"},{"last_affected":"8064ccc50bffe86ad464246b9bfac7d78d7dbc1f"}],"database_specific":{"versions":[{"introduced":"2.4.0"},{"last_affected":"2.4.46"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-35452.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"12.4.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"17.1"}]},{"events":[{"introduced":"0"},{"last_affected":"17.2"}]},{"events":[{"introduced":"0"},{"last_affected":"17.3"}]},{"events":[{"introduced":"0"},{"last_affected":"8.8"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}]}