A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2907-1 | apache2 security update |
Debian DSA |
DSA-5035-1 | apache2 security update |
Ubuntu USN |
USN-5212-1 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-5212-2 | Apache HTTP Server vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T04:32:13.543Z
Reserved: 2021-12-10T00:00:00
Link: CVE-2021-44790
No data.
Status : Analyzed
Published: 2021-12-20T12:15:07.440
Modified: 2025-05-01T15:38:06.313
Link: CVE-2021-44790
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN