Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-22721

Опубликовано: 14 мар. 2022
Источник: redhat
CVSS3: 7.4
EPSS Средний

Описание

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.

Отчет

The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.

Меры по смягчению последствий

Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6httpdOut of support scope
Red Hat Enterprise Linux 7httpdOut of support scope
Red Hat JBoss Enterprise Application Platform 6httpdOut of support scope
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2022:884008.12.2022
JBoss Core Services on RHEL 7jbcs-httpd24-httpdFixedRHSA-2022:884008.12.2022
Red Hat Enterprise Linux 8httpdFixedRHSA-2022:764708.11.2022
Red Hat Enterprise Linux 9httpdFixedRHSA-2022:806715.11.2022
Red Hat Software Collections for Red Hat Enterprise Linux 7httpd24-httpdFixedRHSA-2022:675329.09.2022
Text-Only JBCSjbcs-httpd24-httpdFixedRHSA-2022:884108.12.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190->CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2064320httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody

EPSS

Процентиль: 96%
0.23333
Средний

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
больше 3 лет назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

CVSS3: 9.1
nvd
больше 3 лет назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

CVSS3: 9.1
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 9.1
debian
больше 3 лет назад

If LimitXMLRequestBody is set to allow request bodies larger than 350M ...

CVSS3: 9.8
github
больше 3 лет назад

If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.

EPSS

Процентиль: 96%
0.23333
Средний

7.4 High

CVSS3