Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-22721

Опубликовано: 14 мар. 2022
Источник: debian
EPSS Средний

Описание

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.53-1package
apache2fixed2.4.53-1~deb11u1bullseyepackage
apache2fixed2.4.38-3+deb10u8busterpackage

Примечания

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721

  • Fixed by: https://svn.apache.org/r1898693

EPSS

Процентиль: 94%
0.13159
Средний

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 4 лет назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

CVSS3: 7.4
redhat
около 4 лет назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

CVSS3: 9.1
nvd
около 4 лет назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

CVSS3: 9.1
msrc
около 4 лет назад

core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody

CVSS3: 9.8
github
около 4 лет назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

EPSS

Процентиль: 94%
0.13159
Средний