Lucene search

K
gentooGentoo FoundationGLSA-202305-20
HistoryMay 03, 2023 - 12:00 a.m.

libapreq2: Buffer Overflow

2023-05-0300:00:00
Gentoo Foundation
security.gentoo.org
3
libapreq2
buffer overflow
multipart form
denial of service

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.029 Low

EPSS

Percentile

90.8%

Background

libapreq is a shared library with associated modules for manipulating client request data via the Apache API.

Description

A buffer overflow could occur when processing multipart form uploads.

Impact

An attacker could submit a crafted multipart form to trigger the buffer overflow and cause a denial of service.

Workaround

There is no known workaround at this time.

Resolution

All libapreq2 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apache/libapreq2-2.17"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apache/libapreq2< 2.17UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.029 Low

EPSS

Percentile

90.8%