QID 355218

Date Published: 2023-05-29

QID 355218: Amazon Linux Security Advisory for httpd : ALAS2023-2023-115

A carefully crafted if: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent.
This could cause the process to crash.
This issue affects apache http server 2.4.54 and earlier. (
( CVE-2006-20001) inconsistent interpretation of http requests ('http request smuggling') vulnerability in mod_proxy_ajp of apache http server allows an attacker to smuggle requests to the ajp server it forwards requests to.
This issue affects apache http server apache http server 2.4 version 2.4.54 and prior versions. (
( CVE-2022-36760) prior to apache http server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body.
If the later headers have any security purpose, they will not be interpreted by the client. (
( CVE-2022-37436)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2023-2023-115 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 355218

    Software Advisories
    Advisory ID Software Component Link
    ALAS2023-2023-115 amazon linux 2023 URL Logo alas.aws.amazon.com/AL2023/ALAS-2023-115.html