← Zuruck zu CVEs
CVE-2022-23943
CRITICAL9.8
Beschreibung
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht3/14/2022
Zuletzt geandert5/1/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
apache:http_serverdebian:debian_linuxfedoraproject:fedoraoracle:http_serveroracle:zfs_storage_appliance_kit
Schwachen (CWE)
CWE-190CWE-787CWE-787
Referenzen
http://www.openwall.com/lists/oss-security/2022/03/14/1(security@apache.org)
https://httpd.apache.org/security/vulnerabilities_24.html(security@apache.org)
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html(security@apache.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/(security@apache.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/(security@apache.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/(security@apache.org)
https://security.gentoo.org/glsa/202208-20(security@apache.org)
https://security.netapp.com/advisory/ntap-20220321-0001/(security@apache.org)
https://www.oracle.com/security-alerts/cpuapr2022.html(security@apache.org)
https://www.tenable.com/security/tns-2022-08(security@apache.org)
https://www.tenable.com/security/tns-2022-09(security@apache.org)
http://www.openwall.com/lists/oss-security/2022/03/14/1(af854a3a-2127-422b-91ae-364da2661108)
https://httpd.apache.org/security/vulnerabilities_24.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202208-20(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20220321-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2022-08(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2022-09(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.