QID 353971
Date Published: 2022-07-11
QID 353971: Amazon Linux Security Advisory for httpd24 : ALAS-2022-1607
An http request smuggling vulnerability was found in the mod_proxy_ajp module of httpd.
This flaw allows an attacker to smuggle requests to the ajp server, where it forwards requests. (
( CVE-2022-26377) an out-of-bounds read vulnerability was found in the mod_isapi module of httpd.
The issue occurs when httpd is configured to process requests with the mod_isapi module. (
( CVE-2022-28330) an out-of-bounds read vulnerability was found in httpd.
A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read. (
( CVE-2022-28614) an out-of-bounds read vulnerability was found in httpd.
A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read. (
( CVE-2022-28615) a flaw was found in the mod_lua module of httpd.
A malicious request to a lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size. (
( CVE-2022-29404) a flaw was found in the mod_sed module of httpd.
A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations. (
( CVE-2022-30522) a flaw was found in the mod_lua module of httpd.
The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS-2022-1607 -
alas.aws.amazon.com/ALAS-2022-1607.html
CVEs related to QID 353971
Advisory ID | Software | Component | Link |
---|---|---|---|
ALAS-2022-1607 | Amazon Linux |
![]() |