Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-44790

Опубликовано: 20 дек. 2021
Источник: debian

Описание

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.52-1package

Примечания

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-44790

  • Fixed by: https://svn.apache.org/r1896039

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 4 года назад

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

CVSS3: 9.8
redhat
почти 4 года назад

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

CVSS3: 9.8
nvd
почти 4 года назад

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

CVSS3: 9.8
msrc
почти 4 года назад

Описание отсутствует

rocky
больше 3 лет назад

Important: httpd:2.4 security update