Description
A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2907-1 | apache2 security update |
Debian DSA |
DSA-5035-1 | apache2 security update |
Ubuntu USN |
USN-5212-1 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-5212-2 | Apache HTTP Server vulnerabilities |
References
History
No history.
Subscriptions
Apache
Subscribe
Http Server
Subscribe
Apple
Subscribe
Mac Os X
Subscribe
Macos
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Netapp
Subscribe
Cloud Backup
Subscribe
Oracle
Subscribe
Communications Element Manager
Subscribe
Communications Operations Monitor
Subscribe
Communications Session Report Manager
Subscribe
Communications Session Route Manager
Subscribe
Http Server
Subscribe
Instantis Enterprisetrack
Subscribe
Zfs Storage Appliance Kit
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Software Collections
Subscribe
Rhel Tus
Subscribe
Tenable
Subscribe
Tenable.sc
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T04:32:13.543Z
Reserved: 2021-12-10T00:00:00.000Z
Link: CVE-2021-44790
No data.
Status : Analyzed
Published: 2021-12-20T12:15:07.440
Modified: 2025-05-01T15:38:06.313
Link: CVE-2021-44790
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN