Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-44790

Опубликовано: 20 дек. 2021
Источник: debian
EPSS Высокий

Описание

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.52-1package

Примечания

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-44790

  • Fixed by: https://svn.apache.org/r1896039

EPSS

Процентиль: 99%
0.87234
Высокий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 4 года назад

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

CVSS3: 9.8
redhat
почти 4 года назад

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

CVSS3: 9.8
nvd
почти 4 года назад

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

CVSS3: 9.8
msrc
почти 4 года назад

Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier

rocky
почти 4 года назад

Important: httpd:2.4 security update

EPSS

Процентиль: 99%
0.87234
Высокий