Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-22721

Опубликовано: 14 мар. 2022
Источник: debian
EPSS Средний

Описание

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.53-1package
apache2fixed2.4.53-1~deb11u1bullseyepackage
apache2fixed2.4.38-3+deb10u8busterpackage

Примечания

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721

  • Fixed by: https://svn.apache.org/r1898693

EPSS

Процентиль: 96%
0.23333
Средний

Связанные уязвимости

CVSS3: 9.1
ubuntu
больше 3 лет назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

CVSS3: 7.4
redhat
больше 3 лет назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

CVSS3: 9.1
nvd
больше 3 лет назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

CVSS3: 9.1
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 9.8
github
больше 3 лет назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

EPSS

Процентиль: 96%
0.23333
Средний