Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-22721

Опубликовано: 14 мар. 2022
Источник: debian
EPSS Средний

Описание

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.53-1package
apache2fixed2.4.53-1~deb11u1bullseyepackage
apache2fixed2.4.38-3+deb10u8busterpackage

Примечания

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721

  • Fixed by: https://svn.apache.org/r1898693

EPSS

Процентиль: 95%
0.18952
Средний

Связанные уязвимости

CVSS3: 9.1
ubuntu
почти 4 года назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

CVSS3: 7.4
redhat
почти 4 года назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

CVSS3: 9.1
nvd
почти 4 года назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

CVSS3: 9.1
msrc
почти 4 года назад

core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody

CVSS3: 9.8
github
почти 4 года назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

EPSS

Процентиль: 95%
0.18952
Средний