Impact
This vulnerability arises from an improper null termination in the ajp_msg_get_string function within Apache HTTP Server’s mod_proxy_ajp module, causing an out‑of‑bounds read. The over‑read can expose arbitrary memory contents of the server process, leading to information disclosure, and may trigger a crash, resulting in denial of service. The weakness is classified as CWE-125 (Out‑of‑Bounds Read) and CWE-170 (Improper Null Termination).
Affected Systems
Apache Software Foundation’s Apache HTTP Server is affected through version 2.4.66. Users are advised to upgrade to version 2.4.67 or later, where the null‑termination check has been restored.
Risk and Exploitability
This vulnerability is accessible remotely via the AJP protocol; based on the description, it is inferred that an attacker can send a specially crafted request to trigger the over‑read. The CVSS score is 5.3, EPSS is not available, and the issue is not listed in CISA’s KEV catalog. While the probability of exploitation is unknown, the remote nature of the attack, coupled with the potential for data leakage or service disruption, warrants prompt action.
OpenCVE Enrichment