Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-34037

Опубликовано: 22 июл. 2022
Источник: redhat
EPSS Низкий

Описание

An out-of-bounds read in the rewrite function at /modules/caddyhttp/rewrite/rewrite.go in Caddy v2.5.1 allows attackers to cause a Denial of Service (DoS) via a crafted URI. Note: This has been disputed as a bug, not a security vulnerability, in the Caddy web server that emerged when an administrator's bad configuration containing a malformed request URI caused the server to return an empty reply instead of a valid HTTP response to the client.

Отчет

Red Hat Product Security does not consider this to be a vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Migration Toolkit for Containersrhmtc/openshift-migration-controller-rhel8Not affected
Migration Toolkit for Containersrhmtc/openshift-migration-velero-plugin-for-aws-rhel8Not affected
Migration Toolkit for Containersrhmtc/openshift-migration-velero-plugin-for-gcp-rhel8Not affected
Migration Toolkit for Containersrhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8Not affected
Migration Toolkit for Containersrhmtc/openshift-migration-velero-restic-restore-helper-rhel8Not affected
Migration Toolkit for Containersrhmtc/openshift-velero-plugin-rhel8Not affected
OpenShift API for Data Protectionoadp/oadp-kubevirt-velero-plugin-rhel9Not affected
OpenShift API for Data Protectionoadp/oadp-rhel8-operatorNot affected
OpenShift API for Data Protectionoadp/oadp-velero-plugin-for-aws-rhel9Not affected
OpenShift API for Data Protectionoadp/oadp-velero-plugin-for-csi-rhel8Not affected

Показывать по

Дополнительная информация

Дефект:
CWE-125

EPSS

Процентиль: 69%
0.00614
Низкий

Связанные уязвимости

CVSS3: 7.5
nvd
больше 3 лет назад

An out-of-bounds read in the rewrite function at /modules/caddyhttp/rewrite/rewrite.go in Caddy v2.5.1 allows attackers to cause a Denial of Service (DoS) via a crafted URI. Note: This has been disputed as a bug, not a security vulnerability, in the Caddy web server that emerged when an administrator's bad configuration containing a malformed request URI caused the server to return an empty reply instead of a valid HTTP response to the client.

suse-cvrf
больше 3 лет назад

Security update for caddy

CVSS3: 7.5
github
больше 3 лет назад

Withdrawn Advisory: Out-of-bounds Read can lead to client side denial of service

EPSS

Процентиль: 69%
0.00614
Низкий