[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250039

 
 

909

 
 

195882

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-115 --- httpd

ID: oval:org.secpod.oval:def:19500067Date: (C)2023-06-12   (M)2024-01-29
Class: PATCHFamily: unix




A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. Inconsistent Interpretation of HTTP Requests vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions. Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client

Platform:
Amazon Linux 2023
Product:
httpd
mod_ldap
mod_session
mod_lua
mod_proxy_html
mod_ssl
Reference:
ALAS2023-2023-115
CVE-2006-20001
CVE-2022-36760
CVE-2022-37436
CVE    3
CVE-2006-20001
CVE-2022-37436
CVE-2022-36760
CPE    5
cpe:/a:apache:http_server
cpe:/a:apache:mod_proxy_html
cpe:/a:apache:mod_session
cpe:/a:apache:mod_ldap
...

© SecPod Technologies