2022-04-04 14:01:23 +00:00
{
"CVE_data_meta" : {
2022-06-08 10:59:03 +01:00
"ASSIGNER" : "security@apache.org" ,
2022-04-04 14:01:23 +00:00
"ID" : "CVE-2022-28614" ,
2022-06-08 10:59:03 +01:00
"STATE" : "PUBLIC" ,
"TITLE" : "read beyond bounds via ap_rwrite() "
2022-04-04 14:01:23 +00:00
} ,
2022-06-08 10:59:03 +01:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Apache HTTP Server" ,
"version" : {
"version_data" : [
{
"version_affected" : "<=" ,
"version_value" : "2.4.53"
}
]
}
}
]
} ,
"vendor_name" : "Apache Software Foundation"
}
]
}
} ,
"credit" : [
{
"lang" : "eng" ,
"value" : "The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue"
}
] ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2022-04-04 14:01:23 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2022-06-15 08:06:19 +01:00
"value" : "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue."
2022-04-04 14:01:23 +00:00
}
]
2022-06-08 10:59:03 +01:00
} ,
"generator" : {
"engine" : "Vulnogram 0.0.9"
} ,
"impact" : [
{
"other" : "low"
}
] ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-190 Integer Overflow or Wraparound"
}
]
} ,
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2022-06-09 17:01:48 +00:00
"refsource" : "MISC" ,
"url" : "https://httpd.apache.org/security/vulnerabilities_24.html" ,
"name" : "https://httpd.apache.org/security/vulnerabilities_24.html"
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20220608 CVE-2022-28614: Apache HTTP Server: read beyond bounds via ap_rwrite()" ,
"url" : "http://www.openwall.com/lists/oss-security/2022/06/08/4"
2022-06-24 16:00:47 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://security.netapp.com/advisory/ntap-20220624-0005/" ,
"url" : "https://security.netapp.com/advisory/ntap-20220624-0005/"
2022-07-01 06:00:46 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2022-e620fb15d5" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/"
2022-07-06 05:00:43 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2022-b54a8dee29" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/"
2022-08-14 02:00:38 +00:00
} ,
{
"refsource" : "GENTOO" ,
"name" : "GLSA-202208-20" ,
"url" : "https://security.gentoo.org/glsa/202208-20"
2022-06-08 10:59:03 +01:00
}
]
} ,
"source" : {
"discovery" : "UNKNOWN"
} ,
"timeline" : [
{
"lang" : "eng" ,
"time" : "2022-06-08" ,
"value" : "released in 2.4.54"
}
]
2022-06-24 16:00:47 +00:00
}