blob: adf4faf870d62f344309d9de3fdf7354ca433d21 [file] [log] [blame]
{
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2021-44790",
"STATE": "REVIEW",
"TITLE": "Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache HTTP Server",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "Apache HTTP Server 2.4",
"version_value": "2.4.51"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Chamal"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts).\nThe Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one.\n\nThis issue affects Apache HTTP Server 2.4.51 and earlier."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": [
{
"other": "high"
}
],
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787 Out-of-bounds Write"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM"
}
]
},
"source": {
"discovery": "UNKNOWN"
},
"timeline": [
{
"lang": "eng",
"time": "2021-12-07",
"value": "Reported to security team"
},
{
"lang": "eng",
"time": "2021-12-16",
"value": "Fixed by r1896039 in 2.4.x"
},
{
"lang": "eng",
"time": "2021-12-20",
"value": "2.4.52 released"
}
]
}