Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-28614

Опубликовано: 08 июн. 2022
Источник: redhat
CVSS3: 5.3

Описание

The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.

An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6httpdOut of support scope
Red Hat Enterprise Linux 7httpdOut of support scope
Red Hat JBoss Enterprise Application Platform 6httpd22Out of support scope
Red Hat JBoss Web Server 3httpd24Fix deferred
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2022:884008.12.2022
JBoss Core Services on RHEL 7jbcs-httpd24-httpdFixedRHSA-2022:884008.12.2022
Red Hat Enterprise Linux 8httpdFixedRHSA-2022:764708.11.2022
Red Hat Enterprise Linux 9httpdFixedRHSA-2022:806715.11.2022
Red Hat Software Collections for Red Hat Enterprise Linux 7httpd24-httpdFixedRHSA-2022:675329.09.2022
Text-Only JBCShttpdFixedRHSA-2022:884108.12.2022

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-190->CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=2095002httpd: Out-of-bounds read via ap_rwrite()

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 3 лет назад

The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.

CVSS3: 5.3
nvd
около 3 лет назад

The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.

CVSS3: 5.3
debian
около 3 лет назад

The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may ...

CVSS3: 5.3
github
около 3 лет назад

The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function.

oracle-oval
почти 3 года назад

ELSA-2022-9714: httpd security update (IMPORTANT)

5.3 Medium

CVSS3