A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
02 Nov 2022, 13:18
Type | Values Removed | Values Added |
---|---|---|
References | (FULLDISC) http://seclists.org/fulldisclosure/2022/May/35 - Mailing List, Third Party Advisory | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2022/May/38 - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/kb/HT213257 - Third Party Advisory | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2022/May/33 - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/kb/HT213255 - Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202208-20 - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ - Mailing List, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/kb/HT213256 - Third Party Advisory | |
CPE | cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:* cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:* cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:*:*:*:*:*:*:* |
15 Aug 2022, 11:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 May 2022, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 May 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Apr 2022, 00:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Apr 2022, 18:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20220321-0001/ - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/ - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/ - Third Party Advisory |
26 Mar 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Mar 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Mar 2022, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Mar 2022, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Mar 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Mar 2022, 18:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | |
CWE | CWE-665 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | (MLIST) http://www.openwall.com/lists/oss-security/2022/03/14/4 - Mailing List, Third Party Advisory | |
References | (MISC) https://httpd.apache.org/security/vulnerabilities_24.html - Vendor Advisory |
14 Mar 2022, 15:51
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Mar 2022, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-14 11:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-22719
Mitre link : CVE-2022-22719
CVE.ORG link : CVE-2022-22719
JSON object : View
Products Affected
apple
- macos
- mac_os_x
debian
- debian_linux
oracle
- http_server
- zfs_storage_appliance_kit
apache
- http_server
fedoraproject
- fedora
CWE
CWE-665
Improper Initialization