CVE-2022-28615
Description
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
CWE
- CWE-190 — CWE-190 Integer Overflow or Wraparound
Affected
- Apache Software Foundation / Apache HTTP Server — v=Apache HTTP Server ≤2.4.53 [affected]
CVSS
- (none)
References
- https://httpd.apache.org/security/vulnerabilities_24.html x_refsource_MISC
- http://www.openwall.com/lists/oss-security/2022/06/08/9 mailing-list, x_refsource_MLIST
- https://security.netapp.com/advisory/ntap-20220624-0005/ x_refsource_CONFIRM
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/ vendor-advisory, x_refsource_FEDORA
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/ vendor-advisory, x_refsource_FEDORA
- https://security.gentoo.org/glsa/202208-20 vendor-advisory, x_refsource_GENTOO
Source
cvelistV5-main/cves/2022/28xxx/CVE-2022-28615.json