← Volver a CVEs
CVE-2022-23943
CRITICAL9.8
Descripcion
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado3/14/2022
Ultima modificacion5/1/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
apache:http_serverdebian:debian_linuxfedoraproject:fedoraoracle:http_serveroracle:zfs_storage_appliance_kit
Debilidades (CWE)
CWE-190CWE-787CWE-787
Referencias
http://www.openwall.com/lists/oss-security/2022/03/14/1(security@apache.org)
https://httpd.apache.org/security/vulnerabilities_24.html(security@apache.org)
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html(security@apache.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/(security@apache.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/(security@apache.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/(security@apache.org)
https://security.gentoo.org/glsa/202208-20(security@apache.org)
https://security.netapp.com/advisory/ntap-20220321-0001/(security@apache.org)
https://www.oracle.com/security-alerts/cpuapr2022.html(security@apache.org)
https://www.tenable.com/security/tns-2022-08(security@apache.org)
https://www.tenable.com/security/tns-2022-09(security@apache.org)
http://www.openwall.com/lists/oss-security/2022/03/14/1(af854a3a-2127-422b-91ae-364da2661108)
https://httpd.apache.org/security/vulnerabilities_24.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202208-20(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20220321-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2022-08(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2022-09(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.