CVE-2022-28614
Description
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
CWE
- CWE-190 — CWE-190 Integer Overflow or Wraparound
- CWE-200 — CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Affected
- Apache Software Foundation / Apache HTTP Server — v=unspecified ≤2.4.53 [affected]
CVSS
- (none)
References
- https://httpd.apache.org/security/vulnerabilities_24.html x_refsource_MISC
- http://www.openwall.com/lists/oss-security/2022/06/08/4 mailing-list, x_refsource_MLIST
- https://security.netapp.com/advisory/ntap-20220624-0005/ x_refsource_CONFIRM
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/ vendor-advisory, x_refsource_FEDORA
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/ vendor-advisory, x_refsource_FEDORA
- https://security.gentoo.org/glsa/202208-20 vendor-advisory, x_refsource_GENTOO
Source
cvelistV5-main/cves/2022/28xxx/CVE-2022-28614.json