Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-28615

Опубликовано: 08 июн. 2022
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.

An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.

Отчет

According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6httpdOut of support scope
Red Hat Enterprise Linux 7httpdOut of support scope
Red Hat JBoss Enterprise Application Platform 6httpd22Out of support scope
Red Hat JBoss Web Server 3httpd24Fix deferred
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2022:884008.12.2022
JBoss Core Services on RHEL 7jbcs-httpd24-httpdFixedRHSA-2022:884008.12.2022
Red Hat Enterprise Linux 8httpdFixedRHSA-2022:764708.11.2022
Red Hat Enterprise Linux 9httpdFixedRHSA-2022:806715.11.2022
Red Hat Software Collections for Red Hat Enterprise Linux 7httpd24-httpdFixedRHSA-2022:675329.09.2022
Text-Only JBCShttpdFixedRHSA-2022:884108.12.2022

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-190->CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2095006httpd: Out-of-bounds read in ap_strcmp_match()

EPSS

Процентиль: 73%
0.00775
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.

CVSS3: 9.1
nvd
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.

CVSS3: 9.1
debian
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may crash or disclose informatio ...

CVSS3: 9.1
github
около 3 лет назад

Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.

CVSS3: 4
fstec
около 3 лет назад

Уязвимость функции ap_strcmp_match() веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 73%
0.00775
Низкий

7.4 High

CVSS3