Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-73qw-6rjv-mchr

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

Ссылки

EPSS

Процентиль: 93%
0.10734
Средний

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 10 лет назад

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

redhat
больше 10 лет назад

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

nvd
больше 10 лет назад

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

debian
больше 10 лет назад

The lua_websocket_read function in lua_request.c in the mod_lua module ...

fstec
больше 10 лет назад

Уязвимость веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 93%
0.10734
Средний

Дефекты

CWE-20