The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-33056 | The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue. |
Ubuntu USN |
USN-5487-1 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-5487-3 | Apache HTTP Server regression |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T05:56:16.107Z
Reserved: 2022-04-04T00:00:00
Link: CVE-2022-28614
No data.
Status : Modified
Published: 2022-06-09T17:15:09.180
Modified: 2024-11-21T06:57:35.057
Link: CVE-2022-28614
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN