CVE-2022-22721
Published: 14 March 2022
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
Priority
Status
Package | Release | Status |
---|---|---|
apache2 Launchpad, Ubuntu, Debian |
bionic |
Released
(2.4.29-1ubuntu4.22)
|
focal |
Released
(2.4.41-4ubuntu3.10)
|
|
impish |
Released
(2.4.48-3.1ubuntu3.3)
|
|
jammy |
Released
(2.4.52-1ubuntu2)
|
|
trusty |
Released
(2.4.7-1ubuntu4.22+esm4)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Released
(2.4.53)
|
|
xenial |
Released
(2.4.18-2ubuntu3.17+esm5)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
Patches: upstream: https://github.com/apache/httpd/commit/5a72f0fe6f2f8ce35c45242e99a421dc19251ab5 upstream: https://svn.apache.org/viewvc?view=revision&revision=1898693 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |