ALAS-2022-1607 --- httpd24ID: oval:org.secpod.oval:def:1601561 | Date: (C)2022-07-14 (M)2024-01-29 |
Class: PATCH | Family: unix |
An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests. An out-of-bounds read vulnerability was found in the mod_isapi module of httpd. The issue occurs when httpd is configured to process requests with the mod_isapi module. An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read. An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read. A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody can lead to a denial of service due to no default limit on the possible input size. A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations. A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure. A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism
Platform: |
Amazon Linux AMI |
Product: |
httpd24 |
mod24_session |
mod24_ldap |
mod24_md |
mod24_proxy_html |
mod24_ssl |