Vulnerabilities > CVE-2022-22728
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
A flaw in Apache libapreq2 versions 2.16 and earlier could cause a buffer overflow while processing multipart form uploads. A remote attacker could send a request causing a process crash which could lead to a denial of service attack.
Vulnerable Configurations
References
- http://www.openwall.com/lists/oss-security/2022/08/25/3
- http://www.openwall.com/lists/oss-security/2022/08/25/3
- http://www.openwall.com/lists/oss-security/2022/08/25/4
- http://www.openwall.com/lists/oss-security/2022/08/25/4
- http://www.openwall.com/lists/oss-security/2022/08/26/4
- http://www.openwall.com/lists/oss-security/2022/08/26/4
- http://www.openwall.com/lists/oss-security/2022/12/29/1
- http://www.openwall.com/lists/oss-security/2022/12/29/1
- http://www.openwall.com/lists/oss-security/2022/12/30/4
- http://www.openwall.com/lists/oss-security/2022/12/30/4
- http://www.openwall.com/lists/oss-security/2022/12/31/1
- http://www.openwall.com/lists/oss-security/2022/12/31/1
- http://www.openwall.com/lists/oss-security/2022/12/31/5
- http://www.openwall.com/lists/oss-security/2022/12/31/5
- http://www.openwall.com/lists/oss-security/2023/01/02/1
- http://www.openwall.com/lists/oss-security/2023/01/02/1
- http://www.openwall.com/lists/oss-security/2023/01/02/2
- http://www.openwall.com/lists/oss-security/2023/01/02/2
- http://www.openwall.com/lists/oss-security/2023/01/03/2
- http://www.openwall.com/lists/oss-security/2023/01/03/2
- https://lists.apache.org/thread/2fsjoor96d47vtkpf76x4yo06nccvy1y
- https://lists.apache.org/thread/2fsjoor96d47vtkpf76x4yo06nccvy1y
- https://lists.debian.org/debian-lts-announce/2023/01/msg00009.html
- https://lists.debian.org/debian-lts-announce/2023/01/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2PUUS3JL44UUSLJTSXE46HVKZIW7E7PE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2PUUS3JL44UUSLJTSXE46HVKZIW7E7PE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HZZKVHYYWACPWONPEFRNPIRE3HYLV4T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HZZKVHYYWACPWONPEFRNPIRE3HYLV4T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE5MEHGIQUEIISBCVHM43IN2NBDXBFOJ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE5MEHGIQUEIISBCVHM43IN2NBDXBFOJ/
- https://security.gentoo.org/glsa/202305-20
- https://security.gentoo.org/glsa/202305-20