[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250039

 
 

909

 
 

195882

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2022-1783 --- httpd

ID: oval:org.secpod.oval:def:1700890Date: (C)2022-05-04   (M)2024-01-29
Class: PATCHFamily: unix




A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest treat of this vulnerability is availability. A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling. A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write. An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker

Platform:
Amazon Linux 2
Product:
httpd
mod_ssl
mod_md
mod_proxy_html
mod_ldap
mod_session
Reference:
ALAS2-2022-1783
CVE-2022-22719
CVE-2022-22720
CVE-2022-22721
CVE-2022-23943
CVE    4
CVE-2022-23943
CVE-2022-22721
CVE-2022-22720
CVE-2022-22719
...
CPE    7
cpe:/a:apache:http_server
cpe:/a:apache:mod_proxy_html
cpe:/a:apache:mod_session
cpe:/o:amazon:linux:2
...

© SecPod Technologies