QID 353126
Date Published: 2022-02-01
QID 353126: Amazon Linux Security Advisory for httpd : ALAS2-2022-1737
There's a null pointer dereference and server-side request forgery flaw in httpd's mod_proxy module, when it is configured to be used as a forward proxy.
A crafted packet could be sent on the adjacent network to the forward proxy that could cause a crash, or potentially ssrf via misdirected unix domain socket requests.
In the worst case, this could cause a denial of service or compromise to confidentiality of data. (
( CVE-2021-44224) a buffer overflow flaw in httpd's lua module could allow an out-of-bounds write.
An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability. (
( CVE-2021-44790)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2-2022-1737 -
alas.aws.amazon.com/AL2/ALAS-2022-1737.html
CVEs related to QID 353126
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2-2022-1737 | Amazon Linux 2 |
|