CVE-2022-22721
Description
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
CWE
- CWE-190 — CWE-190 Integer Overflow or Wraparound
Affected
- Apache Software Foundation / Apache HTTP Server — v=Apache HTTP Server 2.4 ≤2.4.52 [affected]
CVSS
- (none)
References
- https://httpd.apache.org/security/vulnerabilities_24.html x_refsource_MISC
- http://www.openwall.com/lists/oss-security/2022/03/14/2 mailing-list, x_refsource_MLIST
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ vendor-advisory, x_refsource_FEDORA
- https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html mailing-list, x_refsource_MLIST
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ vendor-advisory, x_refsource_FEDORA
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ vendor-advisory, x_refsource_FEDORA
- https://www.oracle.com/security-alerts/cpuapr2022.html x_refsource_MISC
- https://security.netapp.com/advisory/ntap-20220321-0001/ x_refsource_CONFIRM
- http://seclists.org/fulldisclosure/2022/May/33 mailing-list, x_refsource_FULLDISC
- http://seclists.org/fulldisclosure/2022/May/35 mailing-list, x_refsource_FULLDISC
- http://seclists.org/fulldisclosure/2022/May/38 mailing-list, x_refsource_FULLDISC
- https://www.oracle.com/security-alerts/cpujul2022.html x_refsource_MISC
- https://support.apple.com/kb/HT213257 x_refsource_CONFIRM
- https://support.apple.com/kb/HT213256 x_refsource_CONFIRM
- https://support.apple.com/kb/HT213255 x_refsource_CONFIRM
- https://security.gentoo.org/glsa/202208-20 vendor-advisory, x_refsource_GENTOO
Source
cvelistV5-main/cves/2022/22xxx/CVE-2022-22721.json