Lucene search

K
httpdApache Team FoundationHTTPD:8806CE4EFAA6A567C7FAD62778B6A46F
HistoryJun 08, 2022 - 12:00 a.m.

Apache Httpd < 2.4.54 : read beyond bounds via ap_rwrite()

2022-06-0800:00:00
Apache Team Foundation
httpd.apache.org
42
apache http server
memory read
security vulnerability
code fix
software update

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.003

Percentile

71.9%

The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function.

Modules compiled and distributed separately from Apache HTTP Server that use the “ap_rputs” function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.

Affected configurations

Vulners
Node
apacheapache_httpdMatch2.4.53
VendorProductVersionCPE
apacheapache_httpd2.4.53cpe:2.3:a:apache:apache_httpd:2.4.53:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.003

Percentile

71.9%