vulnerability
Apache HTTPD: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:N/C:N/I:P/A:P) | Mar 14, 2022 | Apr 25, 2022 | Dec 9, 2024 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:P)
Published
Mar 14, 2022
Added
Apr 25, 2022
Modified
Dec 9, 2024
Description
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
Solution
apache-httpd-upgrade-latest
References
- URL-http://seclists.org/fulldisclosure/2022/May/33
- URL-http://seclists.org/fulldisclosure/2022/May/35
- URL-http://seclists.org/fulldisclosure/2022/May/38
- URL-http://www.openwall.com/lists/oss-security/2022/03/14/2
- URL-https://httpd.apache.org/security/vulnerabilities_24.html
- URL-https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
- URL-https://security.gentoo.org/glsa/202208-20
- URL-https://security.netapp.com/advisory/ntap-20220321-0001/
- URL-https://support.apple.com/kb/HT213255
- URL-https://support.apple.com/kb/HT213256
- URL-https://support.apple.com/kb/HT213257
- URL-https://www.oracle.com/security-alerts/cpuapr2022.html
- URL-https://www.oracle.com/security-alerts/cpujul2022.html
- CVE-2022-22721
- https://attackerkb.com/topics/CVE-2022-22721

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.