Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-28615

Опубликовано: 09 июн. 2022
Источник: debian
EPSS Низкий

Описание

Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.54-1package
apache2fixed2.4.54-1~deb11u1bullseyepackage
apache2fixed2.4.38-3+deb10u8busterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2022/06/08/9

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615

  • https://github.com/apache/httpd/commit/6503d09ab51047554c384a6d03646ce1a8848120

EPSS

Процентиль: 73%
0.00775
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.

CVSS3: 7.4
redhat
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.

CVSS3: 9.1
nvd
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.

CVSS3: 9.1
github
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.

CVSS3: 4
fstec
около 3 лет назад

Уязвимость функции ap_strcmp_match() веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 73%
0.00775
Низкий