Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-44790

Опубликовано: 20 дек. 2021
Источник: redhat
CVSS3: 9.8
EPSS Высокий

Описание

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

A buffer overflow flaw in httpd's lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.

Отчет

httpd as shipped in Red Hat Enterprise Linux 6 is NOT affected by this flaw because it does not ship mod_lua.

Меры по смягчению последствий

Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6httpdNot affected
Red Hat Enterprise Linux 9httpdNot affected
Red Hat JBoss Core Servicesjbcs-httpd24-httpdNot affected
Red Hat JBoss Enterprise Application Platform 6httpdOut of support scope
Red Hat Enterprise Linux 7httpdFixedRHSA-2022:014317.01.2022
Red Hat Enterprise Linux 7.3 Advanced Update SupporthttpdFixedRHSA-2022:113901.04.2022
Red Hat Enterprise Linux 7.4 Advanced Update SupporthttpdFixedRHSA-2022:113801.04.2022
Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118)httpdFixedRHSA-2022:113601.04.2022
Red Hat Enterprise Linux 7.6 Telco Extended Update SupporthttpdFixedRHSA-2022:113601.04.2022
Red Hat Enterprise Linux 7.6 Update Services for SAP SolutionshttpdFixedRHSA-2022:113601.04.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-400
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2034674httpd: mod_lua: Possible buffer overflow when parsing multipart content

EPSS

Процентиль: 99%
0.85858
Высокий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 3 лет назад

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

CVSS3: 9.8
nvd
больше 3 лет назад

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

CVSS3: 9.8
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 9.8
debian
больше 3 лет назад

A carefully crafted request body can cause a buffer overflow in the mo ...

rocky
больше 3 лет назад

Important: httpd:2.4 security update

EPSS

Процентиль: 99%
0.85858
Высокий

9.8 Critical

CVSS3