Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-44790

Опубликовано: 20 дек. 2021
Источник: debian

Описание

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.52-1package

Примечания

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-44790

  • Fixed by: https://svn.apache.org/r1896039

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 3 лет назад

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

CVSS3: 9.8
redhat
больше 3 лет назад

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

CVSS3: 9.8
nvd
больше 3 лет назад

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

CVSS3: 9.8
msrc
больше 3 лет назад

Описание отсутствует

rocky
больше 3 лет назад

Important: httpd:2.4 security update