Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w59m-3c5g-3v9c

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

Ссылки

EPSS

Процентиль: 95%
0.21037
Средний

Связанные уязвимости

ubuntu
почти 21 год назад

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

redhat
около 21 года назад

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

nvd
почти 21 год назад

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

debian
почти 21 год назад

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3 ...

EPSS

Процентиль: 95%
0.21037
Средний