Read beyond bounds in ap_strcmp_match()
CVE-2022-28615
9.1CRITICAL
Summary
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
Affected Version(s)
Apache HTTP Server Apache HTTP Server <= 2.4.53
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue