Description
A flaw in Apache libapreq2 versions 2.16 and earlier could cause a buffer overflow while processing multipart form uploads. A remote attacker could send a request causing a process crash which could lead to a denial of service attack.
References (16)
Core 16
Core References
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/08/25/4
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/08/25/3
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/08/26/4
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2PUUS3JL44UUSLJTSXE46HVKZIW7E7PE/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE5MEHGIQUEIISBCVHM43IN2NBDXBFOJ/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HZZKVHYYWACPWONPEFRNPIRE3HYLV4T/
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/12/29/1
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/12/30/4
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/12/31/1
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2022/12/31/5
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2023/01/02/1
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2023/01/02/2
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2023/01/03/2
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/01/msg00009.html
Mailing List, Third Party Advisory
https://lists.apache.org/thread/2fsjoor96d47vtkpf76x4yo06nccvy1y
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202305-20
Scores
CVSS v3
7.5
EPSS
0.1994
EPSS Percentile
95.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-120
Status
published
Products (5)
apache/libapreq2
< 2.16
debian/debian_linux
10.0
fedoraproject/fedora
35
fedoraproject/fedora
36
fedoraproject/fedora
37
Published
Aug 25, 2022
Tracked Since
Feb 18, 2026