Your submission was sent successfully! Close

CVE-2021-44790

Published: 20 December 2021

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
apache2
Launchpad, Ubuntu, Debian
Upstream
Released (2.4.52)
Ubuntu 21.10 (Impish Indri)
Released (2.4.48-3.1ubuntu3.2)
Ubuntu 21.04 (Hirsute Hippo)
Released (2.4.46-4ubuntu1.5)
Ubuntu 20.04 LTS (Focal Fossa)
Released (2.4.41-4ubuntu3.9)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.4.29-1ubuntu4.21)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (2.4.18-2ubuntu3.17+esm4)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.4.7-1ubuntu4.22+esm3)
Patches:
Upstream: https://svn.apache.org/viewvc?view=revision&revision=1896039
Upstream: https://github.com/apache/httpd/commit/07b9768cef6a224d256358c404c6ed5622d8acce