Apache Buffer Vulnerability

Apache Buffer Vulnerability

A critical* vulnerability related to Apache HTTP Server has just published.

Apache Buffer Vulnerability

The version of Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.

Affected Systems

  • Apache HTTP Server (version 2.4.53 and earlier)

IoC’s

-

Recommended Solution(s)

It is highly recommended to upgrade Apache HTTP Server version 2.5.54 (2022-06-08).

It is recommended to check up on the content on the link below:

https://httpd.apache.org/security/vulnerabilities_24.html

CVE / CWE

CVE-2022-28615

Related Website(s)

* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.