CVE-2022-22728

HIGH

Apache Libapreq2 < 2.16 - Buffer Overflow

Title source: rule
STIX 2.1

Description

A flaw in Apache libapreq2 versions 2.16 and earlier could cause a buffer overflow while processing multipart form uploads. A remote attacker could send a request causing a process crash which could lead to a denial of service attack.

References (16)

Core 16
Core References
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/08/25/4
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/08/25/3
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/08/26/4
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/12/29/1
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/12/30/4
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/12/31/1
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/12/31/5
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2023/01/02/1
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2023/01/02/2
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2023/01/03/2
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/01/msg00009.html
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202305-20

Scores

CVSS v3 7.5
EPSS 0.1994
EPSS Percentile 95.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-120
Status published
Products (5)
apache/libapreq2 < 2.16
debian/debian_linux 10.0
fedoraproject/fedora 35
fedoraproject/fedora 36
fedoraproject/fedora 37
Published Aug 25, 2022
Tracked Since Feb 18, 2026