Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-29404

Опубликовано: 09 июн. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.

РелизСтатусПримечание
bionic

released

2.4.29-1ubuntu4.24
devel

released

2.4.54-2ubuntu1
esm-infra-legacy/trusty

not-affected

2.4.7-1ubuntu4.22+esm6
esm-infra/bionic

not-affected

2.4.29-1ubuntu4.24
esm-infra/focal

not-affected

2.4.41-4ubuntu3.12
esm-infra/xenial

released

2.4.18-2ubuntu3.17+esm6
focal

released

2.4.41-4ubuntu3.12
impish

released

2.4.48-3.1ubuntu3.5
jammy

released

2.4.52-1ubuntu4.1
kinetic

released

2.4.54-2ubuntu1

Показывать по

EPSS

Процентиль: 82%
0.01862
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
около 3 лет назад

In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.

CVSS3: 7.5
nvd
около 3 лет назад

In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.

CVSS3: 7.5
debian
около 3 лет назад

In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua ...

CVSS3: 7.5
github
около 3 лет назад

In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.

CVSS3: 5.9
fstec
около 3 лет назад

Уязвимость модуля mod_lua веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 82%
0.01862
Низкий

5 Medium

CVSS2

7.5 High

CVSS3